Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe
Resource
win10v2004-20230703-en
General
-
Target
145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe
-
Size
1.4MB
-
MD5
b5705da30cdc187a200e8162f59934ce
-
SHA1
d1efb8187dc3f8490dabe6acca9eeed4b873d880
-
SHA256
145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5
-
SHA512
61fa5358c9a8fcca1070123dbf73eb3e69b93675c5b6c0c82f731a68e05f6935020388637c6218db0a6d1ab1a1e6be333cb300b495eb6a0be0b2ac43874c7adb
-
SSDEEP
24576:jU5gnPBXu2MDLGdj1UywIQa4Nz9i1uiEmFj/2K4+4Jf+jCwGM6soP2du:qK5u2QLG1Qa4R9i1uiEjM4J4ToP2
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2308 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2880 145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4484 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1812 2880 145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe 82 PID 2880 wrote to memory of 1812 2880 145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe 82 PID 1812 wrote to memory of 2308 1812 cmd.exe 84 PID 1812 wrote to memory of 2308 1812 cmd.exe 84 PID 2880 wrote to memory of 2244 2880 145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe 86 PID 2880 wrote to memory of 2244 2880 145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe"C:\Users\Admin\AppData\Local\Temp\145a45e9e2061f80e13f746f029005841ea7088d2f5e2b766d375a03149b56f5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c TASKKILL /F /IM "steam.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\taskkill.exeTASKKILL /F /IM "steam.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Start steam://2⤵
- Modifies registry class
PID:2244
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4484