Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
27/10/2022, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe
Resource
win10-20220901-en
6 signatures
150 seconds
General
-
Target
51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe
-
Size
255KB
-
MD5
a7aede0e87e4aabc336cb2700d8912df
-
SHA1
be3cc2cd0e2181a351212017af091fe6b3b34266
-
SHA256
51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673
-
SHA512
4e0e927b125c5fb131b19fb72d23f895df03aae5e7122f49a2cf7c90bc5fa1bb6a770ec57f734b968a4809919746809f10d8c1f99ba6c659afdb4c3d2595d9e0
-
SSDEEP
3072:cYXOK3qVax/mqnq5p59gNivf6ygG1e5bY5ahQ4Yr0QQPY42AId0Kh:DxqmQa1y/1eDYr3AQ0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 Process not Found -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3492 51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe 3492 51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3492 51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe"C:\Users\Admin\AppData\Local\Temp\51232d6cace2d4e8dd0b80a5d86fdbdb180dd32f2cb0013a78c54b0e25d91673.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3492