Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-09-2023 13:06
Behavioral task
behavioral1
Sample
Decra.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Decra.exe
Resource
win10-20230915-en
windows10-1703-x64
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
Decra.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Decra.exe
-
Size
308KB
-
MD5
8df1195087daa119e81fd0cc529c88e5
-
SHA1
52f743d2fa6fa607278dac4a2bf7a3c054252c9f
-
SHA256
d981fe00432dc5aa059884558c02276379f4cadbb7054c23962cb71122342b9d
-
SHA512
2d141a3d6879f7b39b69f3d4acf0ee5faa28d786fdb538daeabd834cff344647985eff48747cf5e8061eb583b72ca33741399be43e73c92bf4e9d8b06dd108b3
-
SSDEEP
6144:kk4DdotiH8um78UhQyZ72VQShKLzuTHDZnvU4lYgfg:r61m7rhQyZiBV4gf
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Decra.exedescription pid process target process PID 2108 created 1244 2108 Decra.exe Explorer.EXE -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Decra.exedescription ioc process File opened (read-only) \??\Q: Decra.exe File opened (read-only) \??\R: Decra.exe File opened (read-only) \??\S: Decra.exe File opened (read-only) \??\A: Decra.exe File opened (read-only) \??\B: Decra.exe File opened (read-only) \??\I: Decra.exe File opened (read-only) \??\L: Decra.exe File opened (read-only) \??\M: Decra.exe File opened (read-only) \??\T: Decra.exe File opened (read-only) \??\V: Decra.exe File opened (read-only) \??\W: Decra.exe File opened (read-only) \??\E: Decra.exe File opened (read-only) \??\H: Decra.exe File opened (read-only) \??\J: Decra.exe File opened (read-only) \??\K: Decra.exe File opened (read-only) \??\P: Decra.exe File opened (read-only) \??\Z: Decra.exe File opened (read-only) \??\Y: Decra.exe File opened (read-only) \??\G: Decra.exe File opened (read-only) \??\N: Decra.exe File opened (read-only) \??\O: Decra.exe File opened (read-only) \??\U: Decra.exe File opened (read-only) \??\X: Decra.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Decra.exeDecra.exedescription pid process target process PID 2108 wrote to memory of 2200 2108 Decra.exe Decra.exe PID 2108 wrote to memory of 2200 2108 Decra.exe Decra.exe PID 2108 wrote to memory of 2200 2108 Decra.exe Decra.exe PID 2108 wrote to memory of 2200 2108 Decra.exe Decra.exe PID 2200 wrote to memory of 1368 2200 Decra.exe cmd.exe PID 2200 wrote to memory of 1368 2200 Decra.exe cmd.exe PID 2200 wrote to memory of 1368 2200 Decra.exe cmd.exe PID 2200 wrote to memory of 1368 2200 Decra.exe cmd.exe PID 2108 wrote to memory of 2136 2108 Decra.exe cmd.exe PID 2108 wrote to memory of 2136 2108 Decra.exe cmd.exe PID 2108 wrote to memory of 2136 2108 Decra.exe cmd.exe PID 2108 wrote to memory of 2136 2108 Decra.exe cmd.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
Decra.exeDecra.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe"C:\Users\Admin\AppData\Local\Temp\Decra.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe\\?\C:\Users\Admin\AppData\Local\Temp\Decra.exe -network2⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:1368
-
-