Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe
Resource
win10v2004-20230915-en
General
-
Target
30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe
-
Size
12.2MB
-
MD5
6f5afccb543699bc11d94d853f5cc5c0
-
SHA1
b3a17db7b176724a50a2b789c89c38701e965222
-
SHA256
30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e
-
SHA512
f5ca37655d2b44c06b99872fb8e30d305f651e45aed5334b7fe28dd70fef0f1623cd66a6a2b45d3c80c1116115ec9a3327ee344374aac0e169ac17bd617f8ece
-
SSDEEP
196608:SCl53kLw4OoehnX0S6mUDPNNkLbKF1/Kz9N5XxVEScZNpy8bUnHeoNsC033:l6chnX0S6mUumF1yFXxVEScHbkee0H
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Neetscapes = "C:\\Program Files\\Mrosofs\\sploosvr.exe" 30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2008 30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe 2008 30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe 2008 30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Mrosofs\sploosvr.exe 30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe File opened for modification C:\Program Files\Mrosofs\sploosvr.exe 30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe"C:\Users\Admin\AppData\Local\Temp\30fb96709ebda116b86ee9792f5ea5ed382f5705440b399ac3d9e66710720d1e.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:2008