Analysis
-
max time kernel
138s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
12-04-2022 11:48
Static task
static1
Behavioral task
behavioral1
Sample
cda9310715b7a12f47b7c134260d5ff9200c147fc1d05f030e507e57e3582327.exe
Resource
win10v2004-20220310-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
cda9310715b7a12f47b7c134260d5ff9200c147fc1d05f030e507e57e3582327.exe
-
Size
624KB
-
MD5
9ec8468dd4a81b0b35c499b31e67375e
-
SHA1
6fa04992c0624c7aa3ca80da6a30e6de91226a16
-
SHA256
cda9310715b7a12f47b7c134260d5ff9200c147fc1d05f030e507e57e3582327
-
SHA512
bd6b37a0395f0ae508c54dcb62d5258adfb8c202605db8310c6b8758c3874bd2364491b1b129209ba1854df27f35149f891ac785a89fe26ddc45c40cad8023b2
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3444 4844 WerFault.exe cda9310715b7a12f47b7c134260d5ff9200c147fc1d05f030e507e57e3582327.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
taskmgr.exepid process 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 4612 taskmgr.exe Token: SeSystemProfilePrivilege 4612 taskmgr.exe Token: SeCreateGlobalPrivilege 4612 taskmgr.exe Token: 33 4612 taskmgr.exe Token: SeIncBasePriorityPrivilege 4612 taskmgr.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
Processes:
taskmgr.exepid process 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe -
Suspicious use of SendNotifyMessage 43 IoCs
Processes:
taskmgr.exepid process 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe 4612 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cda9310715b7a12f47b7c134260d5ff9200c147fc1d05f030e507e57e3582327.exe"C:\Users\Admin\AppData\Local\Temp\cda9310715b7a12f47b7c134260d5ff9200c147fc1d05f030e507e57e3582327.exe"1⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 4762⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4844 -ip 48441⤵PID:4788
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4612
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:224