Analysis

  • max time kernel
    1178s
  • max time network
    1180s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-01-2024 23:54

General

  • Target

    SpectraKinetic.exe

  • Size

    169KB

  • MD5

    950f284c525f5372997af67e082b0bc2

  • SHA1

    9bde5a665f3b4d86aa9267b8f587ace95615fbf6

  • SHA256

    83deff18d50843ee70ca9bfa8d473521fd6af885a6c925b56f63391aad3ee0f3

  • SHA512

    f5f0a8ddd29ea886ca526f56818be74e6b3dda07df00eaad96e31a8ff94ce5e92e8e0b30fe0b4271681e7c42ef04f7ad6a95364db277d783ab0c66bce11aecee

  • SSDEEP

    3072:s2AIisquQrYBA5nz55sHI01gEznJw3Z7gWR3lfT:sRsqu/Arso0esqgWR

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SpectraKinetic.exe
    "C:\Users\Admin\AppData\Local\Temp\SpectraKinetic.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\System32\msiexec.exe
      \??\C:\Windows\System32\msiexec.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\System32\reg.exe
        reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v SpectraKinetic /d "\"C:\Users\Admin\AppData\Roaming\Pfjsqg\SpectraKinetic.exe\""
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:968
      • C:\Windows\System32\reg.exe
        reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v SpectraKinetic /d "\"C:\Users\Admin\AppData\Roaming\Pfjsqg\SpectraKinetic.exe\""
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2056
      • C:\Windows\System32\reg.exe
        reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v SpectraKinetic /d "\"C:\Users\Admin\AppData\Roaming\Pfjsqg\SpectraKinetic.exe\""
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-29-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-31-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-13-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-12-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-17-0x00000214AAB20000-0x00000214AAD29000-memory.dmp

    Filesize

    2.0MB

  • memory/1992-28-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-10-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-30-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-37-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-32-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-33-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-34-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-35-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/1992-36-0x00000214A8710000-0x00000214A8750000-memory.dmp

    Filesize

    256KB

  • memory/4032-0-0x000001D5D1860000-0x000001D5D1A69000-memory.dmp

    Filesize

    2.0MB