Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/02/2025, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe
Resource
win10v2004-20250129-en
General
-
Target
e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe
-
Size
701KB
-
MD5
87e76b3ab65fafd1506f411841c73e94
-
SHA1
3810482f5a3187ccf1dbc8ce4fc0752bb7e44c18
-
SHA256
e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44
-
SHA512
c51ab6b12270d827de00eaccd212468e24ce5510b9b8e8fda36efc7792ed72d1c2321af7a6552a576e9dcb0bb0dbed7ba5345cb959a4460b8a934f6fc67521d3
-
SSDEEP
12288:AYyPYswecl9ZzHS49uH5hYLl4D4i4uS8zpAzh33gyAmLxOjrIy6NYxYQL:cweKyILwXRA133gK2rIw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2680 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 30 PID 2236 wrote to memory of 2680 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 30 PID 2236 wrote to memory of 2680 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 30 PID 2236 wrote to memory of 2680 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 30 PID 2236 wrote to memory of 2068 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 31 PID 2236 wrote to memory of 2068 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 31 PID 2236 wrote to memory of 2068 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 31 PID 2236 wrote to memory of 2068 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 31 PID 2236 wrote to memory of 2920 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 32 PID 2236 wrote to memory of 2920 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 32 PID 2236 wrote to memory of 2920 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 32 PID 2236 wrote to memory of 2920 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 32 PID 2236 wrote to memory of 2744 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 33 PID 2236 wrote to memory of 2744 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 33 PID 2236 wrote to memory of 2744 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 33 PID 2236 wrote to memory of 2744 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 33 PID 2236 wrote to memory of 2708 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 34 PID 2236 wrote to memory of 2708 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 34 PID 2236 wrote to memory of 2708 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 34 PID 2236 wrote to memory of 2708 2236 e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"2⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"2⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"2⤵PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"2⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"C:\Users\Admin\AppData\Local\Temp\e207ac84a52789e4f93b901bdc24a0b9930759d50aab651cc3d5d1f3be7a3e44.exe"2⤵PID:2708
-