Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 23:45
Static task
static1
Behavioral task
behavioral1
Sample
TT000900_989990.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
TT000900_989990.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
TT000900_989990.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
TT000900_989990.exe
Resource
win11-20241007-en
General
-
Target
TT000900_989990.exe
-
Size
894KB
-
MD5
f343cb0399d345b279de6d50d99f4be9
-
SHA1
6983c9557f3ab79b9a78f069599080d6988fd0c1
-
SHA256
451e257b591ad6beacf73a6ff2dc67942fa68cdd453da2784e084d790e66d3df
-
SHA512
109ab328298c9945aafabe0c306b4ba4534171e40d7ef966ed5e5e14fcc4a87d3ebbc3ff4800fd42fcc78c2d9211b37d37461538f8c79ee3e79fdd5fc429fb19
-
SSDEEP
12288:BjO5fIDWxzzaaIUGQ44wgdPkp7XLPtdnTJKQiP4Uh+4ryD5exR0xknr5eVLdCmfq:BCO7oUsP2myXx+iKvrG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TT000900_989990.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe 2096 TT000900_989990.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2096 TT000900_989990.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2808 2096 TT000900_989990.exe 30 PID 2096 wrote to memory of 2808 2096 TT000900_989990.exe 30 PID 2096 wrote to memory of 2808 2096 TT000900_989990.exe 30 PID 2096 wrote to memory of 2808 2096 TT000900_989990.exe 30 PID 2096 wrote to memory of 2812 2096 TT000900_989990.exe 31 PID 2096 wrote to memory of 2812 2096 TT000900_989990.exe 31 PID 2096 wrote to memory of 2812 2096 TT000900_989990.exe 31 PID 2096 wrote to memory of 2812 2096 TT000900_989990.exe 31 PID 2096 wrote to memory of 2820 2096 TT000900_989990.exe 32 PID 2096 wrote to memory of 2820 2096 TT000900_989990.exe 32 PID 2096 wrote to memory of 2820 2096 TT000900_989990.exe 32 PID 2096 wrote to memory of 2820 2096 TT000900_989990.exe 32 PID 2096 wrote to memory of 2884 2096 TT000900_989990.exe 33 PID 2096 wrote to memory of 2884 2096 TT000900_989990.exe 33 PID 2096 wrote to memory of 2884 2096 TT000900_989990.exe 33 PID 2096 wrote to memory of 2884 2096 TT000900_989990.exe 33 PID 2096 wrote to memory of 3040 2096 TT000900_989990.exe 34 PID 2096 wrote to memory of 3040 2096 TT000900_989990.exe 34 PID 2096 wrote to memory of 3040 2096 TT000900_989990.exe 34 PID 2096 wrote to memory of 3040 2096 TT000900_989990.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"C:\Users\Admin\AppData\Local\Temp\TT000900_989990.exe"2⤵PID:3040
-