Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/12/2023, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
2 - Copy.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2 - Copy.exe
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
2 - Copy.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral4
Sample
2 - Copy.exe
Resource
win11-20231128-en
Behavioral task
behavioral5
Sample
2.exe
Resource
win7-20231130-en
Behavioral task
behavioral6
Sample
2.exe
Resource
win10-20231129-en
Behavioral task
behavioral7
Sample
2.exe
Resource
win10v2004-20231130-en
Behavioral task
behavioral8
Sample
2.exe
Resource
win11-20231129-en
General
-
Target
2 - Copy.exe
-
Size
902KB
-
MD5
34a98268ac65cb4ab39175f4035d95ef
-
SHA1
37aae493e8ca8caa792fb7a4a26859826f3c28e5
-
SHA256
8e127555bfa80d79e62cf239f53fe66783dc11f5dbe1e42925a0ee9535a85c31
-
SHA512
2c3775145e1397fa8e2ad8c546079a6e747d241d0bdf30478cc97e378fa62fd66445762fe70d24004b720e56b53b42db38d45c0eb8477a2c65ebc19bf7aa1222
-
SSDEEP
6144:cedQzQcAKMRUOUqN+0sE6I9raFU4t9nF20bK4rLxWYqaUGrJ+bHpq1:ced6QmMRrNL6e4TFbEYqazrJMg1
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4632 schtasks.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2419339351-1576266894-3530880589-1000\Software\Microsoft\Internet Explorer\Main 2 - Copy.exe Set value (int) \REGISTRY\USER\S-1-5-21-2419339351-1576266894-3530880589-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" 2 - Copy.exe Key created \REGISTRY\USER\S-1-5-21-2419339351-1576266894-3530880589-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2 - Copy.exe Set value (str) \REGISTRY\USER\S-1-5-21-2419339351-1576266894-3530880589-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2 - Copy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe 3212 2 - Copy.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3212 2 - Copy.exe Token: 33 3364 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3364 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3212 2 - Copy.exe 3212 2 - Copy.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4632 3212 2 - Copy.exe 81 PID 3212 wrote to memory of 4632 3212 2 - Copy.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2 - Copy.exe"C:\Users\Admin\AppData\Local\Temp\2 - Copy.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /mo 1 /tn CClanarTask /tr C:\Users\Admin\AppData\Local\Temp\2 - Copy.exe2⤵
- Creates scheduled task(s)
PID:4632
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x0000000000000464 0x00000000000004C41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3364