Analysis
-
max time kernel
87s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
736653ba47e554fa2ae92cec7aa5e9f1.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
736653ba47e554fa2ae92cec7aa5e9f1.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
736653ba47e554fa2ae92cec7aa5e9f1.exe
-
Size
50KB
-
MD5
736653ba47e554fa2ae92cec7aa5e9f1
-
SHA1
7262dc821623ba59a7ce28063e5b1c458bc5c9ad
-
SHA256
15b69101c8daaad8fb43603853fc28c68aef53d32a2d8a9217a2bd7ff784325e
-
SHA512
a52c5f4774e75ac0f7016bdbe928ae8ef05f89d5565b56eab83d02560ab8f31058a5f28f1b565135aaabec43fdf90df46b662a2e03a15353cd45a57535f9182f
-
SSDEEP
768:eQJmE666HqpuAu7iJaJzzeWNWm9R7/fW6sQu4n91xJucYXsiDK+yvn4LZD:eQUE56KpuAB4zeWRn7/fK0xgvsn41
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B4D9D6D-E8A1-C0A0-6852-5E7EA3F60F71} 736653ba47e554fa2ae92cec7aa5e9f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B4D9D6D-E8A1-C0A0-6852-5E7EA3F60F71}\stubpath = "%SystemRoot%\\system32\\vmtoolsd.exe" 736653ba47e554fa2ae92cec7aa5e9f1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\vmtoolsd.exe 736653ba47e554fa2ae92cec7aa5e9f1.exe File opened for modification C:\Windows\SysWOW64\vmtoolsd.exe 736653ba47e554fa2ae92cec7aa5e9f1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4244 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe 93 PID 1136 wrote to memory of 4244 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe 93 PID 1136 wrote to memory of 4244 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe 93 PID 1136 wrote to memory of 1824 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe 96 PID 1136 wrote to memory of 1824 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe 96 PID 1136 wrote to memory of 1824 1136 736653ba47e554fa2ae92cec7aa5e9f1.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\736653ba47e554fa2ae92cec7aa5e9f1.exe"C:\Users\Admin\AppData\Local\Temp\736653ba47e554fa2ae92cec7aa5e9f1.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{5B4D9D6D-E8A1-C0A0-6852-5E7EA3F60F71}" /f2⤵PID:4244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\736653~1.EXE > nul2⤵PID:1824
-