Analysis
-
max time kernel
9s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe
Resource
win7-20241010-en
General
-
Target
e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe
-
Size
1.1MB
-
MD5
73c43f022ab0f2c487b181d2f663da1d
-
SHA1
717f9dc672446cab2a0bbfc3c776304370ec9d23
-
SHA256
e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851
-
SHA512
9894abb1aeb900ded96cb1dbf8c75d2160e1ac8a5787525c5adb4f8c39feca3897ea026752a6028e5d1a62ca3c7acae6767532eb0305b1ec812915c6d13c68ff
-
SSDEEP
12288:Gp+rgRNyA55IxJ+feDOa9rZj5XqkJD0QrOod7XxlW91RRzwAY3Ak83R1:GpugRNJI1D39dlfGQrFUxwAeAk83R1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1764 e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe"C:\Users\Admin\AppData\Local\Temp\e8150f2ffbd67dbb394b4d6889693cfd50b5bfaf74825f814c3b46832d6d8851.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764