Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 16:58
General
-
Target
AppleCleaner.exe
-
Size
229KB
-
MD5
932743e04b592d487ccc1228d06c1861
-
SHA1
b73718231a99836cd795a267c4d8283a4ac28f98
-
SHA256
566b54607603dfa8fd98fb3a37a269324e8fc4d663a5d350b5ffe262cca417fe
-
SHA512
4ac1c1d385651fc3e6a04c53d3625a8a2a8f9cdb40f1fd136136d1b289763732765d2424f9eb13fa6040d211dbc8c768b2bb2e6f3032b105c1c04c90d161b07e
-
SSDEEP
6144:dloZM3fsXtioRkts/cnnK6cMl9I6lrecjfUo1gevPeEtb8e1mxni:/oZ1tlRk83Ml9I6lrecjfUo1gevPeg/
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/1444-0-0x0000021089F10000-0x0000021089F50000-memory.dmp family_umbral -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 1444 AppleCleaner.exe Token: SeIncreaseQuotaPrivilege 1596 wmic.exe Token: SeSecurityPrivilege 1596 wmic.exe Token: SeTakeOwnershipPrivilege 1596 wmic.exe Token: SeLoadDriverPrivilege 1596 wmic.exe Token: SeSystemProfilePrivilege 1596 wmic.exe Token: SeSystemtimePrivilege 1596 wmic.exe Token: SeProfSingleProcessPrivilege 1596 wmic.exe Token: SeIncBasePriorityPrivilege 1596 wmic.exe Token: SeCreatePagefilePrivilege 1596 wmic.exe Token: SeBackupPrivilege 1596 wmic.exe Token: SeRestorePrivilege 1596 wmic.exe Token: SeShutdownPrivilege 1596 wmic.exe Token: SeDebugPrivilege 1596 wmic.exe Token: SeSystemEnvironmentPrivilege 1596 wmic.exe Token: SeRemoteShutdownPrivilege 1596 wmic.exe Token: SeUndockPrivilege 1596 wmic.exe Token: SeManageVolumePrivilege 1596 wmic.exe Token: 33 1596 wmic.exe Token: 34 1596 wmic.exe Token: 35 1596 wmic.exe Token: 36 1596 wmic.exe Token: SeIncreaseQuotaPrivilege 1596 wmic.exe Token: SeSecurityPrivilege 1596 wmic.exe Token: SeTakeOwnershipPrivilege 1596 wmic.exe Token: SeLoadDriverPrivilege 1596 wmic.exe Token: SeSystemProfilePrivilege 1596 wmic.exe Token: SeSystemtimePrivilege 1596 wmic.exe Token: SeProfSingleProcessPrivilege 1596 wmic.exe Token: SeIncBasePriorityPrivilege 1596 wmic.exe Token: SeCreatePagefilePrivilege 1596 wmic.exe Token: SeBackupPrivilege 1596 wmic.exe Token: SeRestorePrivilege 1596 wmic.exe Token: SeShutdownPrivilege 1596 wmic.exe Token: SeDebugPrivilege 1596 wmic.exe Token: SeSystemEnvironmentPrivilege 1596 wmic.exe Token: SeRemoteShutdownPrivilege 1596 wmic.exe Token: SeUndockPrivilege 1596 wmic.exe Token: SeManageVolumePrivilege 1596 wmic.exe Token: 33 1596 wmic.exe Token: 34 1596 wmic.exe Token: 35 1596 wmic.exe Token: 36 1596 wmic.exe Token: SeDebugPrivilege 2744 taskmgr.exe Token: SeSystemProfilePrivilege 2744 taskmgr.exe Token: SeCreateGlobalPrivilege 2744 taskmgr.exe Token: 33 2744 taskmgr.exe Token: SeIncBasePriorityPrivilege 2744 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe 2744 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1596 1444 AppleCleaner.exe 88 PID 1444 wrote to memory of 1596 1444 AppleCleaner.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\AppleCleaner.exe"C:\Users\Admin\AppData\Local\Temp\AppleCleaner.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744