Resubmissions

25/10/2023, 13:58

231025-q979cshd42 1

25/10/2023, 13:54

231025-q72c2ahc87 3

25/10/2023, 13:53

231025-q6ywhshc46 1

Analysis

  • max time kernel
    131s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/10/2023, 13:54

General

  • Target

    Microsoft.HEVCVideoExtension_2.0.61931.0_neutral_~_8wekyb3d8bbwe.zip

  • Size

    8.1MB

  • MD5

    66c42eaf72fb5778ef9eec0609f13070

  • SHA1

    4e747e31ccd2f883486f2fb76e35cbd3e49b84e6

  • SHA256

    fbcfbc9ed5c1777946b0dad7a5813377960a134e9907d3e0669804d273defe90

  • SHA512

    98d70e19ea07546484a42d22b8b82a724f67c88c383935aa697e1c256c668794962bafb29b2881c0e5e675a07c2c0660aaf24dfe8c42cf851ad59fe0b710cbd5

  • SSDEEP

    196608:Rw3gZStNz0/Wdo1gY1HVYEpGupq0/Wdo1FY1RVYEeupuGVYEbup17:hMti/Wyzxoupr/Wy4reupfbuph

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Microsoft.HEVCVideoExtension_2.0.61931.0_neutral_~_8wekyb3d8bbwe.zip
    1⤵
      PID:2140
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1444-0-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-2-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-1-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-7-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-6-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-8-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-10-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-9-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-11-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB

    • memory/1444-12-0x0000024285950000-0x0000024285951000-memory.dmp

      Filesize

      4KB