Resubmissions
04-06-2023 23:32
230604-3jsr7seb32 804-06-2023 23:15
230604-28kmfsef4y 1004-06-2023 23:14
230604-2757rsea95 304-06-2023 23:14
230604-27zpzsea94 304-06-2023 23:11
230604-26dfcsea88 7Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 23:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Morpheus Crypter.zip
Resource
win10v2004-20230220-en
5 signatures
1800 seconds
General
-
Target
Morpheus Crypter.zip
-
Size
1.0MB
-
MD5
d2061d06219385c6b96b25bf1a099c4c
-
SHA1
160a5b7c91b771adcb54d83b7a1a424bfddc9662
-
SHA256
271319b95a4992827b8aa1aef16e9d4bf3074e7e3444c7947881fd2ba4cdb8a0
-
SHA512
e5cf8ac1625fec16fe2a57ca7b8a57c5e0083ffb556f942f30a8a30b709e282e756fe12f144d7e6f9a1be45c5ceee4387e6dd3cbe4146627fb4a1a36449d7185
-
SSDEEP
24576:Ed09OIibo0I+CXaRTBdUcnUm9S09zlxRS8LZ/O/Xq:f97ibBd5nU+Umw0rx48JO/6
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3080 taskmgr.exe Token: SeSystemProfilePrivilege 3080 taskmgr.exe Token: SeCreateGlobalPrivilege 3080 taskmgr.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe 3080 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Morpheus Crypter.zip"1⤵PID:4088
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3080