Analysis

  • max time kernel
    105s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 15:16

General

  • Target

    Spuffeed.exe

  • Size

    1.7MB

  • MD5

    937bd53a5f505b8e9b00416590ad8d92

  • SHA1

    5abece11f9d282ec009bf441f132676344f1ede2

  • SHA256

    662d56478c8fa24fb43b71cba64af8d941ddb90659c2412144b46137e2cc4c36

  • SHA512

    2027fe14eff8cc0edd67be7f159e0710d79376aef11a70d4c0ad94d501667fd178780fb3a8f0c4481d2da32a3f6fd698e45cef297aee628cda1ae164e0434dd5

  • SSDEEP

    49152:MXi87ZaoNcK9mVrSPYO1M+BrgdhwmzJnU:yvycBr

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spuffeed.exe
    "C:\Users\Admin\AppData\Local\Temp\Spuffeed.exe"
    1⤵
      PID:3768
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4892
    • C:\Windows\System32\notepad.exe
      "C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\ConvertFromRestore.ps1"
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:232

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4892-133-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-134-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-135-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-139-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-140-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-141-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-142-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-143-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-144-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB

    • memory/4892-145-0x00000171A3570000-0x00000171A3571000-memory.dmp

      Filesize

      4KB