Analysis

  • max time kernel
    1373s
  • max time network
    1164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2023, 21:17

General

  • Target

    main.exe

  • Size

    6.9MB

  • MD5

    f464c086b1e01c3bf94f16a3a4b44b71

  • SHA1

    15691b5c3af86f31dd10a1088df37848d26fde68

  • SHA256

    6d93d321048ec6df2def4ede06cf3a9c1bdb9fd7a586cb96550c5bef4bf0f263

  • SHA512

    f731b562d265d93febaee863b6813d9847834fcf8680acbeb3d9f4d1d4eb359b98c00c4f54f1c2c65d4310ba916675960fced2642c3669da81d1edddca7b6b25

  • SSDEEP

    98304:Ns49IgKHW8dFA8IECfnlIHcKY7uNz+m6I7DreNk7RF3G5:lmRW8dFnCg4uNz+m6I7Drx7RF3G

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main.exe
    "C:\Users\Admin\AppData\Local\Temp\main.exe"
    1⤵
      PID:2224
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4968

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4968-12-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-13-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-14-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-19-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-20-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-18-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-22-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-21-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-23-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB

          • memory/4968-24-0x000002681D360000-0x000002681D361000-memory.dmp

            Filesize

            4KB