Resubmissions

04-06-2023 23:32

230604-3jsr7seb32 8

04-06-2023 23:15

230604-28kmfsef4y 10

04-06-2023 23:14

230604-2757rsea95 3

04-06-2023 23:14

230604-27zpzsea94 3

04-06-2023 23:11

230604-26dfcsea88 7

Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2023 23:14

General

  • Target

    Morpheus Crypter.zip

  • Size

    1.0MB

  • MD5

    d2061d06219385c6b96b25bf1a099c4c

  • SHA1

    160a5b7c91b771adcb54d83b7a1a424bfddc9662

  • SHA256

    271319b95a4992827b8aa1aef16e9d4bf3074e7e3444c7947881fd2ba4cdb8a0

  • SHA512

    e5cf8ac1625fec16fe2a57ca7b8a57c5e0083ffb556f942f30a8a30b709e282e756fe12f144d7e6f9a1be45c5ceee4387e6dd3cbe4146627fb4a1a36449d7185

  • SSDEEP

    24576:Ed09OIibo0I+CXaRTBdUcnUm9S09zlxRS8LZ/O/Xq:f97ibBd5nU+Umw0rx48JO/6

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Morpheus Crypter.zip"
    1⤵
      PID:4088
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3080

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3080-133-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-134-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-135-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-139-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-140-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-141-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-142-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-143-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-144-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB

    • memory/3080-145-0x00000226EE0A0000-0x00000226EE0A1000-memory.dmp

      Filesize

      4KB