Analysis
-
max time kernel
88s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 07:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45aa0ea668efffc06f52827457a017b4.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
45aa0ea668efffc06f52827457a017b4.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
45aa0ea668efffc06f52827457a017b4.exe
-
Size
556KB
-
MD5
45aa0ea668efffc06f52827457a017b4
-
SHA1
5b205232cee31b1d4ade9f1f1fe576fa6ea539e4
-
SHA256
768cf770c07c56ffb09c19e3a9d688420e3428b2aa5141127ce6b5f949c7572d
-
SHA512
21be7bf6cb854fe13b3214609313f3f6f291ed45dafcd6e2744971389abb9f266151725272171f5218a02b0fed82fdbeebc3c501c3bd4da7ced919c52a7e302d
-
SSDEEP
6144:R8RBNN505xexoW83cRcf9Z24M3pXTJNY0ql1h2yxOtVdRIPh0H1o0kDnwk:yBNvFXaZxStRfVoNN
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BMP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\45aa0ea668efffc06f52827457a017b4.exe /cs:1 " 45aa0ea668efffc06f52827457a017b4.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Eset\Nod\ 45aa0ea668efffc06f52827457a017b4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1084 set thread context of 3996 1084 45aa0ea668efffc06f52827457a017b4.exe 98 -
Kills process with taskkill 1 IoCs
pid Process 4960 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4960 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3996 1084 45aa0ea668efffc06f52827457a017b4.exe 98 PID 1084 wrote to memory of 3996 1084 45aa0ea668efffc06f52827457a017b4.exe 98 PID 1084 wrote to memory of 3996 1084 45aa0ea668efffc06f52827457a017b4.exe 98 PID 1084 wrote to memory of 3996 1084 45aa0ea668efffc06f52827457a017b4.exe 98 PID 1084 wrote to memory of 3996 1084 45aa0ea668efffc06f52827457a017b4.exe 98 PID 3996 wrote to memory of 4960 3996 45aa0ea668efffc06f52827457a017b4.exe 97 PID 3996 wrote to memory of 4960 3996 45aa0ea668efffc06f52827457a017b4.exe 97 PID 3996 wrote to memory of 4960 3996 45aa0ea668efffc06f52827457a017b4.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\45aa0ea668efffc06f52827457a017b4.exe"C:\Users\Admin\AppData\Local\Temp\45aa0ea668efffc06f52827457a017b4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\45aa0ea668efffc06f52827457a017b4.exe"C:\Users\Admin\AppData\Local\Temp\45aa0ea668efffc06f52827457a017b4.exe" "C:\Users\Admin\AppData\Local\Temp\45aa0ea668efffc06f52827457a017b4.exe"2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious use of WriteProcessMemory
PID:3996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /F /IM MSASCui* /IM avg* /IM ash* /IM McSA* /IM msse*1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4960