Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe
Resource
win10v2004-20231020-en
General
-
Target
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe
-
Size
326KB
-
MD5
c40c5bcb6c4cceadca53b2ca29a7fe0b
-
SHA1
f7aa8ebc0c7a745e3c75082c031780dfbab6e4a9
-
SHA256
9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e
-
SHA512
5b5a217bc49493fde14e9d6a866244c76d73a9a0de2d0f01f46d2d6bdcec011906f63a24f9caedd16a8ac54c21a40be8d020acbfd9726ff7e8a4066f43c1a680
-
SSDEEP
6144:4Ozb+3+UEoTkUdiJxemmh/9p2Aj+wDPc0gQUCrkftmfdOjwzxH4T:9+EoTkUdmxSh/9p2W00FUCrkFm5zxH4
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5d4ff0a6c7 = "C:\\Users\\Admin\\AppData\\Roaming\\5d4ff0a6c7\\1dd7cf18c4.exe" explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4668 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 3700 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4512 vssvc.exe Token: SeRestorePrivilege 4512 vssvc.exe Token: SeAuditPrivilege 4512 vssvc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4668 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4668 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4668 wrote to memory of 3700 4668 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 99 PID 4668 wrote to memory of 3700 4668 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 99 PID 4668 wrote to memory of 3700 4668 9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe 99 PID 3700 wrote to memory of 760 3700 explorer.exe 100 PID 3700 wrote to memory of 760 3700 explorer.exe 100 PID 3700 wrote to memory of 760 3700 explorer.exe 100 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe"C:\Users\Admin\AppData\Local\Temp\9928a35bc486aa85387397966d205b8e3a69f14232d1933f8aaeac7d9026c17e.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\svchost.exe-k netsvcs3⤵PID:760
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512