Analysis

  • max time kernel
    599s
  • max time network
    493s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240419-en
  • resource tags

    arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-04-2024 09:54

General

  • Target

    resources/elevate.exe

  • Size

    105KB

  • MD5

    792b92c8ad13c46f27c7ced0810694df

  • SHA1

    d8d449b92de20a57df722df46435ba4553ecc802

  • SHA256

    9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37

  • SHA512

    6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

  • SSDEEP

    3072:1bLnrwQoRDtdMMgSXiFJWcIgUVCfRjV/GrWl:1PrwRhte1XsE1l

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe
    "C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"
    1⤵
      PID:1308
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2972
    • C:\Windows\System32\Taskmgr.exe
      "C:\Windows\System32\Taskmgr.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5088
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2180

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
        Filesize

        10KB

        MD5

        188e513ebbdb02e7447e280fcf7c004a

        SHA1

        5f355f09d4d47dd56eb1b661dd84acc22538597d

        SHA256

        191198b73d7476d1efb0c6b961de29a5c94f718542252a50677563495bddf82e

        SHA512

        b7a6544550ab316ad8e6aab7028a89fe8fd5fdfae3fed5862adc0a220a48794b00be28365d94fb5d11e914e6a27b14988ffe41411961bb54e9e35878109008e8

      • memory/5088-7-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-8-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-9-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-17-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-16-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-15-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-14-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-13-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-19-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB

      • memory/5088-18-0x000001B8D5300000-0x000001B8D5301000-memory.dmp
        Filesize

        4KB