Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2023 16:06
Static task
static1
Behavioral task
behavioral1
Sample
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe
Resource
win10v2004-20230703-en
General
-
Target
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe
-
Size
310KB
-
MD5
91a0262d7017ee2bc268d043d8c11ab1
-
SHA1
d41ff479d5d3698cbf268b97bf69dbe410b4f530
-
SHA256
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a
-
SHA512
9392982da83c693186c43b97947f49dc8c179c74360e0e5d8a059c35116fa965d446fa3b68220684afb0f353ed6a739dab7a65666ef937b96fdd2cf2ebeaaf84
-
SSDEEP
6144:2177pS1rRGF2xPvJcDr+y4xOtMCmlz5a7dX9QQ:2181rRGF2xPqDrYEtGsdtQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2424 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2856 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4472 wrote to memory of 2964 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 81 PID 4472 wrote to memory of 2964 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 81 PID 2964 wrote to memory of 2424 2964 cmd.exe 83 PID 2964 wrote to memory of 2424 2964 cmd.exe 83 PID 4472 wrote to memory of 3552 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 85 PID 4472 wrote to memory of 3552 4472 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe"C:\Users\Admin\AppData\Local\Temp\e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c TASKKILL /F /IM "steam.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\taskkill.exeTASKKILL /F /IM "steam.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Start steam://2⤵
- Modifies registry class
PID:3552
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2856