Analysis
-
max time kernel
7s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe
Resource
win7-20240903-en
General
-
Target
3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe
-
Size
1007KB
-
MD5
cb2d0498f2bd4d8c4bb74fd0b865d47d
-
SHA1
5031c19d3d78d6490577d840d17132217cdd6f73
-
SHA256
3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959
-
SHA512
d8fe307ca71467ce436f053f53cb7c874d3eeb16c514eaf03f0f6b26a43699b6c147a557e6bf53c84df66cccec454dba569993cd2dcab4368c1d8df2157a8224
-
SSDEEP
12288:Np+rgRNyA55IxJ+feDOa9rZj5XqkJD0QrOod7XxlW91RRz9FQn1:NpugRNJI1D39dlfGQrFUx9Fy1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1420 3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe"C:\Users\Admin\AppData\Local\Temp\3678b2d667a76db63dddde84fd58aae502bc9dca359a8020f04957b995c70959.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420