Analysis
-
max time kernel
1756s -
max time network
1555s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/744102305309130802/1043682831353774100/Keyauth_simple.rar
Resource
win10v2004-20220812-en
General
-
Target
https://cdn.discordapp.com/attachments/744102305309130802/1043682831353774100/Keyauth_simple.rar
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\Keyauth_simple.rar:Zone.Identifier firefox.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
firefox.exe7zG.exedescription pid process Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeRestorePrivilege 4848 7zG.exe Token: 35 4848 7zG.exe Token: SeSecurityPrivilege 4848 7zG.exe Token: SeSecurityPrivilege 4848 7zG.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe Token: SeDebugPrivilege 4020 firefox.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
firefox.exe7zG.exepid process 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4848 7zG.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
firefox.exepid process 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe 4020 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 2896 wrote to memory of 4020 2896 firefox.exe firefox.exe PID 4020 wrote to memory of 3696 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 3696 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 1104 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe PID 4020 wrote to memory of 4464 4020 firefox.exe firefox.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://cdn.discordapp.com/attachments/744102305309130802/1043682831353774100/Keyauth_simple.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://cdn.discordapp.com/attachments/744102305309130802/1043682831353774100/Keyauth_simple.rar2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4020.0.1046859312\760691243" -parentBuildID 20200403170909 -prefsHandle 1692 -prefMapHandle 1684 -prefsLen 1 -prefMapSize 219989 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4020 "\\.\pipe\gecko-crash-server-pipe.4020" 1788 gpu3⤵PID:3696
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4020.3.318103175\1366058882" -childID 1 -isForBrowser -prefsHandle 2464 -prefMapHandle 2244 -prefsLen 112 -prefMapSize 219989 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4020 "\\.\pipe\gecko-crash-server-pipe.4020" 2488 tab3⤵PID:1104
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4020.13.939770348\62033068" -childID 2 -isForBrowser -prefsHandle 3840 -prefMapHandle 3836 -prefsLen 7599 -prefMapSize 219989 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4020 "\\.\pipe\gecko-crash-server-pipe.4020" 3852 tab3⤵PID:4464
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4492
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Keyauth_simple\" -spe -an -ai#7zMap18664:90:7zEvent142731⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40.9MB
MD5505abbc0f43eaf5dc3c4eae90b55c97d
SHA1fca195043891123ae4dac916a6ef0dc316ddc64a
SHA256595ec9778fac14b771a99fd75cb8f9ffd7a66bdf56e7465724a129a7daabac3d
SHA5129f3ad0a08de0800f33d54a5a7e479bdfb47b1fae1ff16173a59528ddb1fc4bb5f20ceeb3865fa18fae6d910cc1efc5c750ead27491c983f4e69903b598eef07a