Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2023 13:06
Behavioral task
behavioral1
Sample
Decra.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Decra.exe
Resource
win10-20230915-en
windows10-1703-x64
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
Decra.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Decra.exe
-
Size
308KB
-
MD5
8df1195087daa119e81fd0cc529c88e5
-
SHA1
52f743d2fa6fa607278dac4a2bf7a3c054252c9f
-
SHA256
d981fe00432dc5aa059884558c02276379f4cadbb7054c23962cb71122342b9d
-
SHA512
2d141a3d6879f7b39b69f3d4acf0ee5faa28d786fdb538daeabd834cff344647985eff48747cf5e8061eb583b72ca33741399be43e73c92bf4e9d8b06dd108b3
-
SSDEEP
6144:kk4DdotiH8um78UhQyZ72VQShKLzuTHDZnvU4lYgfg:r61m7rhQyZiBV4gf
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2336 created 3248 2336 Decra.exe 25 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Decra.exe File opened (read-only) \??\K: Decra.exe File opened (read-only) \??\M: Decra.exe File opened (read-only) \??\T: Decra.exe File opened (read-only) \??\B: Decra.exe File opened (read-only) \??\E: Decra.exe File opened (read-only) \??\H: Decra.exe File opened (read-only) \??\U: Decra.exe File opened (read-only) \??\V: Decra.exe File opened (read-only) \??\W: Decra.exe File opened (read-only) \??\X: Decra.exe File opened (read-only) \??\A: Decra.exe File opened (read-only) \??\I: Decra.exe File opened (read-only) \??\R: Decra.exe File opened (read-only) \??\P: Decra.exe File opened (read-only) \??\O: Decra.exe File opened (read-only) \??\Q: Decra.exe File opened (read-only) \??\S: Decra.exe File opened (read-only) \??\Y: Decra.exe File opened (read-only) \??\Z: Decra.exe File opened (read-only) \??\G: Decra.exe File opened (read-only) \??\L: Decra.exe File opened (read-only) \??\N: Decra.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2180 2336 Decra.exe 72 PID 2336 wrote to memory of 2180 2336 Decra.exe 72 PID 2336 wrote to memory of 2180 2336 Decra.exe 72 PID 2180 wrote to memory of 1768 2180 Decra.exe 74 PID 2180 wrote to memory of 1768 2180 Decra.exe 74 PID 2180 wrote to memory of 1768 2180 Decra.exe 74 PID 2336 wrote to memory of 3592 2336 Decra.exe 75 PID 2336 wrote to memory of 3592 2336 Decra.exe 75 PID 2336 wrote to memory of 3592 2336 Decra.exe 75 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe"C:\Users\Admin\AppData\Local\Temp\Decra.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe\\?\C:\Users\Admin\AppData\Local\Temp\Decra.exe -network2⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:1768
-
-