Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2025 09:55
Behavioral task
behavioral1
Sample
r.exe
Resource
win7-20241010-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
r.exe
Resource
win10v2004-20250207-en
5 signatures
150 seconds
General
-
Target
r.exe
-
Size
3.7MB
-
MD5
8b0d28eb3818bcd456f1b1aefc00e963
-
SHA1
90293997a77479780afde11e12562771a45620aa
-
SHA256
51b4207ed9ef06a4c50808e933fc01ad1eb30613bd65702427bbeddac4c5dc25
-
SHA512
dbf31aa7b42b2575efdeabcef47b9c4513becfedad9569fda7df9c39b8e10d214e8deaf1c0411c80b4359cd67621e6ec21ebb9a1178aea4900303881e0c0433c
-
SSDEEP
49152:N8o8bZjyJVD0s9Mr3XIfRviWkgEOaxfCbCMcXGtSgvZPOQ5Q9:N8o8VOUs9joRbMc2tSW69
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 23 4884 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4572 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3808 wmic.exe Token: SeSecurityPrivilege 3808 wmic.exe Token: SeTakeOwnershipPrivilege 3808 wmic.exe Token: SeLoadDriverPrivilege 3808 wmic.exe Token: SeSystemProfilePrivilege 3808 wmic.exe Token: SeSystemtimePrivilege 3808 wmic.exe Token: SeProfSingleProcessPrivilege 3808 wmic.exe Token: SeIncBasePriorityPrivilege 3808 wmic.exe Token: SeCreatePagefilePrivilege 3808 wmic.exe Token: SeBackupPrivilege 3808 wmic.exe Token: SeRestorePrivilege 3808 wmic.exe Token: SeShutdownPrivilege 3808 wmic.exe Token: SeDebugPrivilege 3808 wmic.exe Token: SeSystemEnvironmentPrivilege 3808 wmic.exe Token: SeRemoteShutdownPrivilege 3808 wmic.exe Token: SeUndockPrivilege 3808 wmic.exe Token: SeManageVolumePrivilege 3808 wmic.exe Token: 33 3808 wmic.exe Token: 34 3808 wmic.exe Token: 35 3808 wmic.exe Token: 36 3808 wmic.exe Token: SeIncreaseQuotaPrivilege 3808 wmic.exe Token: SeSecurityPrivilege 3808 wmic.exe Token: SeTakeOwnershipPrivilege 3808 wmic.exe Token: SeLoadDriverPrivilege 3808 wmic.exe Token: SeSystemProfilePrivilege 3808 wmic.exe Token: SeSystemtimePrivilege 3808 wmic.exe Token: SeProfSingleProcessPrivilege 3808 wmic.exe Token: SeIncBasePriorityPrivilege 3808 wmic.exe Token: SeCreatePagefilePrivilege 3808 wmic.exe Token: SeBackupPrivilege 3808 wmic.exe Token: SeRestorePrivilege 3808 wmic.exe Token: SeShutdownPrivilege 3808 wmic.exe Token: SeDebugPrivilege 3808 wmic.exe Token: SeSystemEnvironmentPrivilege 3808 wmic.exe Token: SeRemoteShutdownPrivilege 3808 wmic.exe Token: SeUndockPrivilege 3808 wmic.exe Token: SeManageVolumePrivilege 3808 wmic.exe Token: 33 3808 wmic.exe Token: 34 3808 wmic.exe Token: 35 3808 wmic.exe Token: 36 3808 wmic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3808 1528 r.exe 88 PID 1528 wrote to memory of 3808 1528 r.exe 88 PID 1528 wrote to memory of 3808 1528 r.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\r.exe"C:\Users\Admin\AppData\Local\Temp\r.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODYxMTU1MzE2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4572