Resubmissions
28/08/2022, 23:26
220828-3e8ymagabq 510/06/2021, 11:42
210610-j9y37a6cma 510/06/2021, 11:31
210610-k9s461t52a 5Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2022, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win10-20220812-en
10 signatures
150 seconds
General
-
Target
sample.exe
-
Size
2.3MB
-
MD5
84ffb87cc91d697db2f5685df68de7af
-
SHA1
4f0360d60b685ed6059d32aef24c6b3cbbd46e9e
-
SHA256
10bba07a1965c61a2ec05b46331e3eeda3d7bdeb8074c86009dc11f2564048fa
-
SHA512
c6b178f37b2318b4eeaf1e151cac70a10b0be8eeb0e8153bd324a66314a33dca27e43254518a4b2db2ed5cab31ff836e0fa84e2a8112b67772409d77f39d5e9f
-
SSDEEP
24576:FKVGZaevvyK4tN8BEY1ajFO+y/i5TKE3QXq1WYpqKoBo:FKVKaevvyJNaajFei5emdWYpqKoBo
Score
5/10
Malware Config
Signatures
-
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\autorun.inf sample.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\autorun.inf sample.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\Notify.jpg" sample.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\Desktop\WallpaperStyle = "6" sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Control Panel\Desktop\TileWallpaper = "0" sample.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4716 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4716 taskmgr.exe Token: SeSystemProfilePrivilege 4716 taskmgr.exe Token: SeCreateGlobalPrivilege 4716 taskmgr.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe -
Suspicious use of SendNotifyMessage 52 IoCs
pid Process 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe 4716 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Drops autorun.inf file
- Sets desktop wallpaper using registry
- Modifies Control Panel
PID:4384
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4716