Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2023 13:06
Behavioral task
behavioral1
Sample
Decra.exe
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Decra.exe
Resource
win10-20230915-en
4 signatures
150 seconds
Behavioral task
behavioral3
Sample
Decra.exe
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
Decra.exe
-
Size
308KB
-
MD5
8df1195087daa119e81fd0cc529c88e5
-
SHA1
52f743d2fa6fa607278dac4a2bf7a3c054252c9f
-
SHA256
d981fe00432dc5aa059884558c02276379f4cadbb7054c23962cb71122342b9d
-
SHA512
2d141a3d6879f7b39b69f3d4acf0ee5faa28d786fdb538daeabd834cff344647985eff48747cf5e8061eb583b72ca33741399be43e73c92bf4e9d8b06dd108b3
-
SSDEEP
6144:kk4DdotiH8um78UhQyZ72VQShKLzuTHDZnvU4lYgfg:r61m7rhQyZiBV4gf
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4376 created 3168 4376 Decra.exe 47 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Decra.exe File opened (read-only) \??\Q: Decra.exe File opened (read-only) \??\T: Decra.exe File opened (read-only) \??\W: Decra.exe File opened (read-only) \??\K: Decra.exe File opened (read-only) \??\O: Decra.exe File opened (read-only) \??\S: Decra.exe File opened (read-only) \??\V: Decra.exe File opened (read-only) \??\Y: Decra.exe File opened (read-only) \??\H: Decra.exe File opened (read-only) \??\J: Decra.exe File opened (read-only) \??\M: Decra.exe File opened (read-only) \??\P: Decra.exe File opened (read-only) \??\R: Decra.exe File opened (read-only) \??\Z: Decra.exe File opened (read-only) \??\A: Decra.exe File opened (read-only) \??\B: Decra.exe File opened (read-only) \??\E: Decra.exe File opened (read-only) \??\G: Decra.exe File opened (read-only) \??\L: Decra.exe File opened (read-only) \??\N: Decra.exe File opened (read-only) \??\U: Decra.exe File opened (read-only) \??\X: Decra.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3856 4376 Decra.exe 87 PID 4376 wrote to memory of 3856 4376 Decra.exe 87 PID 4376 wrote to memory of 3856 4376 Decra.exe 87 PID 3856 wrote to memory of 1296 3856 Decra.exe 89 PID 3856 wrote to memory of 1296 3856 Decra.exe 89 PID 3856 wrote to memory of 1296 3856 Decra.exe 89 PID 4376 wrote to memory of 3312 4376 Decra.exe 92 PID 4376 wrote to memory of 3312 4376 Decra.exe 92 PID 4376 wrote to memory of 3312 4376 Decra.exe 92 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe"C:\Users\Admin\AppData\Local\Temp\Decra.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe\\?\C:\Users\Admin\AppData\Local\Temp\Decra.exe -network2⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:1296
-
-