Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20231020-en
General
-
Target
Loader.exe
-
Size
7.3MB
-
MD5
9454f0102e28c8ba0152c59ac1aa35ea
-
SHA1
5e9e720b018a6515fd021871c16aec82f0607787
-
SHA256
e4e930b31557e201555ad308d24abb1778227b90b6f90fe45b8f193d76d82422
-
SHA512
7f33a5f4f630d964cdadf114b8f08d5d030613b950717b416cd4bffee62638f11b613e52872c5913ace77568d99e3deb3f936ff54b26659e30cf441f3f46db8d
-
SSDEEP
196608:sXm0LbwdcJ6GSEC7wuMMgGJYR5Gj9ZgANoEs3+c:4LLb31C7wMwGj9ZgANiuc
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2296 Loader.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2296 Loader.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GoS\shell\open\command Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoS\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Loader.exe\" \"%1\"" Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GoS Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoS\ = "URL:GoS Protocol" Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoS\URL Protocol Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GoS\shell Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GoS\shell\open Loader.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2296 Loader.exe 2296 Loader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 Loader.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2296 Loader.exe 2296 Loader.exe 2296 Loader.exe 2296 Loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2296
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5fbbb517ba9df09780608d44040ba68d8
SHA18f05d3b9a5f4c93bee394aa758a70eb35b5c8b6d
SHA25695405ea96ddcdb9479c2ea6e07e64aed9077c3dbdd296ef8fb59ca1539697a22
SHA5127a1ea0327a6967c2d6d0037624f31107060e14f1c43ab4abbc477b8834db9787473ce5be814f3439189481ee62f3fe857d25a649661d05d8472d30822163c427