Analysis
-
max time kernel
36s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/01/2025, 13:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
random.exe
-
Size
9.8MB
-
MD5
db3632ef37d9e27dfa2fd76f320540ca
-
SHA1
f894b26a6910e1eb53b1891c651754a2b28ddd86
-
SHA256
0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
-
SHA512
4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
SSDEEP
98304:IWlC18CzkF6kJdZi/lBMoo6Yc3A2o5APDm5:PlW1BMoOED
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 2512 2608 random.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29 PID 2608 wrote to memory of 2512 2608 random.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵PID:2512
-