Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 14:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
37616347c10d6f6623076e662b49f440.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
37616347c10d6f6623076e662b49f440.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
37616347c10d6f6623076e662b49f440.exe
-
Size
4.1MB
-
MD5
37616347c10d6f6623076e662b49f440
-
SHA1
b924cab04accb65219083b2d06a52bbb5db9c5fd
-
SHA256
4f792d5e32547cdbd6724cdf5fb4c6e4956c8f28fdc8be4a56f47b0964d393b1
-
SHA512
917f09979eda45b182a642d9422f4c02c1c41d9d887f8c45b3eeed53e3f97e450306455a4372d16fa537421f56f9f5c6435ad8830b84c3aa1fec2fce580f4256
-
SSDEEP
98304:1DMdmIG8JOPLIjwpbW+xPsFlguFWe5+Vvdo/Wj13Zu:1QFG8JoLIjArMs+Ot
Score
7/10
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\ = "Protect in ASM Guard" 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\Icon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\command 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe\" \"%1\"" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard 37616347c10d6f6623076e662b49f440.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3436 37616347c10d6f6623076e662b49f440.exe 3436 37616347c10d6f6623076e662b49f440.exe -
Modifies registry class 26 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile\shell\ASM Guard\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe\" \"%1\"" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\.asmg 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\DefaultIcon 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe\" \"%1\"" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile\shell 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile\shell\ASM Guard\Icon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\ = "Protect in ASM Guard" 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\shell\open\ = "Open" 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile\shell\ASM Guard\ = "Protect in ASM Guard" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile\shell\ASM Guard 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\Icon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe" 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\.asmg\ = "ASM_Guard" 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\ = "ASM Guard project" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\shell\open\command 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe\" \"%1\"" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\shell\open 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\dllfile\shell\ASM Guard\command 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37616347c10d6f6623076e662b49f440.exe" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\shell 37616347c10d6f6623076e662b49f440.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\ASM_Guard\shell\ = "open" 37616347c10d6f6623076e662b49f440.exe Key created \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000_Classes\exefile\shell\ASM Guard\command 37616347c10d6f6623076e662b49f440.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3436 37616347c10d6f6623076e662b49f440.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37616347c10d6f6623076e662b49f440.exe"C:\Users\Admin\AppData\Local\Temp\37616347c10d6f6623076e662b49f440.exe"1⤵
- Modifies system executable filetype association
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3436