Analysis
-
max time kernel
449s -
max time network
421s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2023, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
exe.win32-3.8.zip
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
exe.win32-3.8.zip
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
exe.win32-3.8.zip
-
Size
28.3MB
-
MD5
e607f134ff1b85b4d2d2642b5e269ae5
-
SHA1
a1d568e6ba0271d847370bb3e961960039da5713
-
SHA256
ae709a8f68b13797de6afc540a3c47da369f77ae207dbb32408edffe330b73bc
-
SHA512
bfac3a8ed9d8eb07e5cd4b75864c77b3a1427f130cc38e3ab0491e3e5b3914c172e97abc8f3b3fe5113695292aa716679709575a6248f3e6b28dc41a27a073fb
-
SSDEEP
786432:GTr2Rt8cEU4XFPaaUdp4H4fi7xBOfZtzAmOvWN3sA8Dc+/O6ky:AKr8cEbFPPyqeWIZtBQWN3sA8D3Bky
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\SpotifyAB.SpotifyMusic_zpdnekdrzrea0\Spotify taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\SpotifyAB.SpotifyMusic_zpdnekdrzrea0\Spotify\State = "0" taskmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\SpotifyAB.SpotifyMusic_zpdnekdrzrea0\Spotify\UserEnabledStartupOnce = "0" taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4752 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4752 taskmgr.exe Token: SeSystemProfilePrivilege 4752 taskmgr.exe Token: SeCreateGlobalPrivilege 4752 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\exe.win32-3.8.zip1⤵PID:2228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1660
-
C:\Users\Admin\Documents\exe.win32-3.8\Syncrack.exe"C:\Users\Admin\Documents\exe.win32-3.8\Syncrack.exe"1⤵PID:2704
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4752
-
C:\Users\Admin\Documents\exe.win32-3.8\Syncrack.exe"C:\Users\Admin\Documents\exe.win32-3.8\Syncrack.exe"1⤵PID:868
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵PID:1628