Resubmissions

06-01-2024 13:46

240106-q22rlsheep 10

05-01-2024 17:03

240105-vk4xvsfcgk 10

Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 17:03

General

  • Target

    Akrien premium 4.0.exe

  • Size

    4.3MB

  • MD5

    8af52c532dee095626de6c3ae0b182bb

  • SHA1

    fa981b39bf3a83e2f68b9f95cb4a968a0fc99d23

  • SHA256

    4a6fa79f84ec213fe6c3a5776a878a2e5734d96819a9bbc865b00bc966cdf976

  • SHA512

    8be5a9d7209b01b3f4e758a63cd0dc272fb33bb53370834f9c564633991e9cce3d8cc9d6efdb3d1554ac209adc6a34afe8db18dbe86b25395e89be590c68e76a

  • SSDEEP

    49152:g/5tJDBRnrQkbB1CjaorTkjf5O5rihkRbxdkkYgpX6tkWuiZMh5WEWkwYTMj:ab6SROk7AOkwB

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Akrien premium 4.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Akrien premium 4.0.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    PID:1880
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4684-2-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-3-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-4-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-8-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-9-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-11-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-10-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-12-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-13-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB

  • memory/4684-14-0x000001F759F30000-0x000001F759F31000-memory.dmp

    Filesize

    4KB