Analysis
-
max time kernel
46s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2023 23:01
Static task
static1
Behavioral task
behavioral1
Sample
isaac-ng.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
300 seconds
General
-
Target
isaac-ng.exe
-
Size
8.3MB
-
MD5
144570b689c45dc8fdcf31f0c059916f
-
SHA1
0d1a3f486fc71f480875d815892de6c12fc8e0a5
-
SHA256
b4abe7384378bd5d8ccc86e7c378b7130c127123e6f82b81bdb3ac0dc70122d2
-
SHA512
cf9d1bb675d8328d8c7fdaa6adb67bba2107a9c5028e72c538de4490cf1501087d8acc2cb5bf8bdd172cd87d450795703f95fa479d1b0896a9754ab88dcaab5c
-
SSDEEP
196608:Uz3y1Q85omajedI7f9k9ulmASfweIzRqUyU:0H8mm697fBlLSfweIzRqLU
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2132 taskmgr.exe Token: SeSystemProfilePrivilege 2132 taskmgr.exe Token: SeCreateGlobalPrivilege 2132 taskmgr.exe Token: 33 2132 taskmgr.exe Token: SeIncBasePriorityPrivilege 2132 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe 2132 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"1⤵PID:4752
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"1⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"1⤵PID:2856
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2132
-
C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"C:\Users\Admin\AppData\Local\Temp\isaac-ng.exe"1⤵PID:4660