Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 12:51
Behavioral task
behavioral1
Sample
Decra.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Decra.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Decra.exe
-
Size
308KB
-
MD5
8df1195087daa119e81fd0cc529c88e5
-
SHA1
52f743d2fa6fa607278dac4a2bf7a3c054252c9f
-
SHA256
d981fe00432dc5aa059884558c02276379f4cadbb7054c23962cb71122342b9d
-
SHA512
2d141a3d6879f7b39b69f3d4acf0ee5faa28d786fdb538daeabd834cff344647985eff48747cf5e8061eb583b72ca33741399be43e73c92bf4e9d8b06dd108b3
-
SSDEEP
6144:kk4DdotiH8um78UhQyZ72VQShKLzuTHDZnvU4lYgfg:r61m7rhQyZiBV4gf
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Decra.exedescription pid process target process PID 2244 created 1192 2244 Decra.exe Explorer.EXE -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Decra.exedescription ioc process File opened (read-only) \??\V: Decra.exe File opened (read-only) \??\Y: Decra.exe File opened (read-only) \??\H: Decra.exe File opened (read-only) \??\K: Decra.exe File opened (read-only) \??\L: Decra.exe File opened (read-only) \??\T: Decra.exe File opened (read-only) \??\E: Decra.exe File opened (read-only) \??\I: Decra.exe File opened (read-only) \??\R: Decra.exe File opened (read-only) \??\O: Decra.exe File opened (read-only) \??\P: Decra.exe File opened (read-only) \??\W: Decra.exe File opened (read-only) \??\B: Decra.exe File opened (read-only) \??\J: Decra.exe File opened (read-only) \??\M: Decra.exe File opened (read-only) \??\N: Decra.exe File opened (read-only) \??\U: Decra.exe File opened (read-only) \??\X: Decra.exe File opened (read-only) \??\Z: Decra.exe File opened (read-only) \??\A: Decra.exe File opened (read-only) \??\G: Decra.exe File opened (read-only) \??\Q: Decra.exe File opened (read-only) \??\S: Decra.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Decra.exeDecra.exedescription pid process target process PID 2244 wrote to memory of 2700 2244 Decra.exe Decra.exe PID 2244 wrote to memory of 2700 2244 Decra.exe Decra.exe PID 2244 wrote to memory of 2700 2244 Decra.exe Decra.exe PID 2244 wrote to memory of 2700 2244 Decra.exe Decra.exe PID 2700 wrote to memory of 2640 2700 Decra.exe cmd.exe PID 2700 wrote to memory of 2640 2700 Decra.exe cmd.exe PID 2700 wrote to memory of 2640 2700 Decra.exe cmd.exe PID 2700 wrote to memory of 2640 2700 Decra.exe cmd.exe PID 2244 wrote to memory of 2732 2244 Decra.exe cmd.exe PID 2244 wrote to memory of 2732 2244 Decra.exe cmd.exe PID 2244 wrote to memory of 2732 2244 Decra.exe cmd.exe PID 2244 wrote to memory of 2732 2244 Decra.exe cmd.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
Decra.exeDecra.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe"C:\Users\Admin\AppData\Local\Temp\Decra.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe\\?\C:\Users\Admin\AppData\Local\Temp\Decra.exe -network2⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:2640
-
-