Analysis
-
max time kernel
139s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
Kernel.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Kernel.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Load Driver [ADMIN].bat
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Load Driver [ADMIN].bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Mapper.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Mapper.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Valorant.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Valorant.exe
Resource
win10v2004-20230915-en
General
-
Target
Load Driver [ADMIN].bat
-
Size
38B
-
MD5
b56b9ab3209f7b0958976644f03776f8
-
SHA1
054c58ab6b517710776fa6ed8e20aabaf37d360f
-
SHA256
419124eb528c4c9ddb1e3713b72be124437f5632cf0ad1cbdc5b81c52407c401
-
SHA512
bf2515e032f3dd8885b4e8aead91dce3d46199d3dad242b8fee980b33a99def11def0f64936da7f3d456d4d376f0c3df68a4dca04b50f9cd314e99441a3d9f77
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\cNEEprgENsKeofnjtjNkpxiyEd\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\cNEEprgENsKeofnjtjNkpxiyEd" Mapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2192 Mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2192 Mapper.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2192 4528 cmd.exe 82 PID 4528 wrote to memory of 2192 4528 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Load Driver [ADMIN].bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\Mapper.exeMapper.exe Kernel.sys2⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2192
-