Analysis
-
max time kernel
103s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe
Resource
win10v2004-20230220-en
General
-
Target
520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe
-
Size
2.4MB
-
MD5
192763968d2cbd12deff65cfa71afb58
-
SHA1
b3de492772b592fe830dc0ed397f71efd442230f
-
SHA256
520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c
-
SHA512
205ef3b29d3e4161220e3e86fc6c90fb8d3799278dd30d16c7f57227aefd63fea156a36de269a2070e196b49abd4f0a6df1105e42b317fb6bfcdf3fa89ae21ba
-
SSDEEP
49152:EYm0o65RpzVVON+1Q6M/tk37WLxKBlvyGiQSV2RLxFCKYT:/mBM16+1LMlIYKP1itcRdU/T
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4996 WinNTSetup_x64.exe -
Loads dropped DLL 4 IoCs
pid Process 2116 520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe 4996 WinNTSetup_x64.exe 4996 WinNTSetup_x64.exe 4996 WinNTSetup_x64.exe -
resource yara_rule behavioral2/files/0x000100000002310c-306.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 WinNTSetup_x64.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4996 WinNTSetup_x64.exe Token: SeSecurityPrivilege 4996 WinNTSetup_x64.exe Token: SeRestorePrivilege 4996 WinNTSetup_x64.exe Token: SeSystemEnvironmentPrivilege 4996 WinNTSetup_x64.exe Token: SeBackupPrivilege 4996 WinNTSetup_x64.exe Token: SeSecurityPrivilege 4996 WinNTSetup_x64.exe Token: SeRestorePrivilege 4996 WinNTSetup_x64.exe Token: SeSecurityPrivilege 4996 WinNTSetup_x64.exe Token: SeTakeOwnershipPrivilege 4996 WinNTSetup_x64.exe Token: SeManageVolumePrivilege 4996 WinNTSetup_x64.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4996 WinNTSetup_x64.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4996 WinNTSetup_x64.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4996 2116 520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe 85 PID 2116 wrote to memory of 4996 2116 520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe"C:\Users\Admin\AppData\Local\Temp\520b19d4c7bad44e586bf55340380feec1d34fd3433484d96eb757682882a85c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\WinNTSetup\WinNTSetup_x64.exeC:\Users\Admin\AppData\Local\Temp\WinNTSetup\WinNTSetup_x64.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5a19a0f76956805a157281a3998f06a29
SHA1eb2e8fece8f2ffd2ef605a000fdbfe46bc97067a
SHA256eb5b467f230bb85a74620a52f139cc35772e89ea9b8ffa2a64e10f878aa7b417
SHA5125f4a013e28fdb2b67883144772afd717813d96f84d9eb680ad016fd78d0d8cc8061b5dd78d07238fd648c62dd1b09a8a0a752575a826bc1c96cdded84635f9db
-
Filesize
489KB
MD57ddd108c095016b0e2e8d6b5b04f93b8
SHA13764d75c02c8ce8d2c78203aa9eb7f8018a112e1
SHA256e1cb831ac9213b52066f934ba0fa80ea8a9de48932452d4142fa085a2ba24fc2
SHA51236c77eaafed04eb3a337a909a90d4c3eb66e1d36531c6248095906332ea6d03dffc9abd7fbcb3c2101065110e4536c0a89b6320dcab386871b3f9d9e34e40bad
-
Filesize
216KB
MD5fba28d5ac166714737d1d8cdf0aef078
SHA1eef8d1bca48ecc93a7f165b735f7047ef085e12d
SHA25654fba1cc80e820b462229fcb987fb8df2321ed85d9450f3f4a81d0982e5d289f
SHA51250791cf079d9bbc26cd80b1f21fed3e2181ee15241dfcbbd964fca0425e634ae422652b58837352aad61775dc5cec7464ff0d23e0624b6f61fc1bc5cc805fd7e
-
Filesize
117KB
MD5709fa2fc9dbd03814312f6d28eaf4a37
SHA13b85bf42645f5be9d678d0d98a11946a4c7aeb65
SHA256ec993b3c8d7522793a141c692c63c413d47e77dfc79d95491d913736fe8b1f01
SHA51225b5f69d926a32de058cfd64dcdfc7579af5908cbbebe80fadd907681a2ca15f863071c5886c8cb5d09e979cce98486e962fc6d81717a49da20cc3eb03e45093
-
Filesize
117KB
MD5709fa2fc9dbd03814312f6d28eaf4a37
SHA13b85bf42645f5be9d678d0d98a11946a4c7aeb65
SHA256ec993b3c8d7522793a141c692c63c413d47e77dfc79d95491d913736fe8b1f01
SHA51225b5f69d926a32de058cfd64dcdfc7579af5908cbbebe80fadd907681a2ca15f863071c5886c8cb5d09e979cce98486e962fc6d81717a49da20cc3eb03e45093
-
Filesize
797KB
MD5fa5b941be590899a59c59dc883ed050f
SHA191a9517d09c298eac0a3e6559be90cd4881fd9ed
SHA25614e85f541b282c59b796ba01ddcf8304f1c94835d2975b3da69cc450afd9d1e8
SHA51209df8788213b2e44995538e295e44aedd49d5c238aee62ac0ac1e2fd1d2705af9754ba4dac2f376a0e6581155f6d0c84f0b5f4b58602b0d658a0ee291ba4b5b1
-
Filesize
797KB
MD5fa5b941be590899a59c59dc883ed050f
SHA191a9517d09c298eac0a3e6559be90cd4881fd9ed
SHA25614e85f541b282c59b796ba01ddcf8304f1c94835d2975b3da69cc450afd9d1e8
SHA51209df8788213b2e44995538e295e44aedd49d5c238aee62ac0ac1e2fd1d2705af9754ba4dac2f376a0e6581155f6d0c84f0b5f4b58602b0d658a0ee291ba4b5b1
-
Filesize
467KB
MD52434784fc3a9bb2c2c26d4b7184d6161
SHA17b125f36293ebb0635795498b48eca62775eb68a
SHA256cc5549eade80f29ead05fc6a86cdf78d22d1b7ab7a17f91877244a7329eebd01
SHA5127eddb5c8c9bb64e2ee0213207fafbdcfa09309780511fb77fdcb7875d6883a9a3a1b3b35276c8e57c866df4e30d29548ad70b52ab5482eb002798d0e27da6633
-
Filesize
467KB
MD52434784fc3a9bb2c2c26d4b7184d6161
SHA17b125f36293ebb0635795498b48eca62775eb68a
SHA256cc5549eade80f29ead05fc6a86cdf78d22d1b7ab7a17f91877244a7329eebd01
SHA5127eddb5c8c9bb64e2ee0213207fafbdcfa09309780511fb77fdcb7875d6883a9a3a1b3b35276c8e57c866df4e30d29548ad70b52ab5482eb002798d0e27da6633
-
Filesize
1.1MB
MD5cf3ea6ba021e1a9553972785843e014f
SHA18edf6548ac55a2b971d0cd44fb39b3206e3dc2ab
SHA256a295e218b6b0ea2eafa83a30093115ee0e049adeeda6829e31b4e9f5165af0e9
SHA51214c0d063ae31de3ca849ff9e1655525af567544ce28ec2750ce1c3025d5fb7e893859a7042e53d9c32c08780bacd28b190fa00333b7f1106e778e7d6cabaf15e
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c