Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:22
Static task
static1
Behavioral task
behavioral1
Sample
dor_2025-01-20_09_22_06.142.zip
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dor_2025-01-20_09_22_06.142.zip
Resource
win10v2004-20241007-en
General
-
Target
dor_2025-01-20_09_22_06.142.zip
-
Size
2.2MB
-
MD5
a085b8d6de6cdfec5bcb6c82008eb3aa
-
SHA1
f0a9b87704c43aefc2247fa903c6b0392a0019a6
-
SHA256
8495fc4e9377c3a363587edb472ffb2a7a920a719ded332f20f5843cbdde9540
-
SHA512
f438571812ebec444fd0e8175185dd2a3eb0bf99aa51caaa1d45fd1a7a7033d8ca4d826de44830ae8d541d92bc763e8dcea508074823d8c1fc8b7b1d8388dd54
-
SSDEEP
49152:QobLBqUPe+8M7+KUcdi3wufqVR0wVwGxZvmBKcQv+vd0tLDfc1WN/1h:QofBpm+82Bbd6lfoCwVrxGKNv+vd0tFl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2420 SPSDSignEx.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPSDSignEx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2172 7zFM.exe Token: 35 2172 7zFM.exe Token: SeSecurityPrivilege 2172 7zFM.exe Token: SeDebugPrivilege 2420 SPSDSignEx.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2172 7zFM.exe 2172 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\dor_2025-01-20_09_22_06.142.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2172
-
C:\Users\Admin\Desktop\SPSDSignEx.exe"C:\Users\Admin\Desktop\SPSDSignEx.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5deb6075563960abb8fbcc49327235cb4
SHA15d6c528d269465516ef55326069aeeeac2048d6d
SHA2560133950c9be534916457a068f424160e14485bd2910e0fa10e27b1dc57a2d57d
SHA512fa1e46c49fef888afbc94b9d6336bb4cead18e51e77713662182e8fe73460ec28f2f279c9a71220cda96e364c7ad858bd994241c46dbcd5d91de1bf89aa84e68