Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 12:51
Behavioral task
behavioral1
Sample
Decra.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Decra.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Decra.exe
-
Size
308KB
-
MD5
8df1195087daa119e81fd0cc529c88e5
-
SHA1
52f743d2fa6fa607278dac4a2bf7a3c054252c9f
-
SHA256
d981fe00432dc5aa059884558c02276379f4cadbb7054c23962cb71122342b9d
-
SHA512
2d141a3d6879f7b39b69f3d4acf0ee5faa28d786fdb538daeabd834cff344647985eff48747cf5e8061eb583b72ca33741399be43e73c92bf4e9d8b06dd108b3
-
SSDEEP
6144:kk4DdotiH8um78UhQyZ72VQShKLzuTHDZnvU4lYgfg:r61m7rhQyZiBV4gf
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4680 created 3160 4680 Decra.exe 65 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: Decra.exe File opened (read-only) \??\U: Decra.exe File opened (read-only) \??\V: Decra.exe File opened (read-only) \??\W: Decra.exe File opened (read-only) \??\Y: Decra.exe File opened (read-only) \??\I: Decra.exe File opened (read-only) \??\J: Decra.exe File opened (read-only) \??\K: Decra.exe File opened (read-only) \??\P: Decra.exe File opened (read-only) \??\H: Decra.exe File opened (read-only) \??\L: Decra.exe File opened (read-only) \??\N: Decra.exe File opened (read-only) \??\R: Decra.exe File opened (read-only) \??\T: Decra.exe File opened (read-only) \??\Z: Decra.exe File opened (read-only) \??\B: Decra.exe File opened (read-only) \??\E: Decra.exe File opened (read-only) \??\O: Decra.exe File opened (read-only) \??\S: Decra.exe File opened (read-only) \??\X: Decra.exe File opened (read-only) \??\A: Decra.exe File opened (read-only) \??\G: Decra.exe File opened (read-only) \??\Q: Decra.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4472 4680 Decra.exe 86 PID 4680 wrote to memory of 4472 4680 Decra.exe 86 PID 4680 wrote to memory of 4472 4680 Decra.exe 86 PID 4472 wrote to memory of 3640 4472 Decra.exe 88 PID 4472 wrote to memory of 3640 4472 Decra.exe 88 PID 4472 wrote to memory of 3640 4472 Decra.exe 88 PID 4680 wrote to memory of 1472 4680 Decra.exe 89 PID 4680 wrote to memory of 1472 4680 Decra.exe 89 PID 4680 wrote to memory of 1472 4680 Decra.exe 89 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Decra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" Decra.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe"C:\Users\Admin\AppData\Local\Temp\Decra.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\Decra.exe\\?\C:\Users\Admin\AppData\Local\Temp\Decra.exe -network2⤵
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:3640
-
-