Analysis
-
max time kernel
137s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 06:45
Behavioral task
behavioral1
Sample
76aa540cabd3fb9bb10485b47fc5d97f.exe
Resource
win7-20231129-en
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
76aa540cabd3fb9bb10485b47fc5d97f.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
76aa540cabd3fb9bb10485b47fc5d97f.exe
-
Size
198KB
-
MD5
76aa540cabd3fb9bb10485b47fc5d97f
-
SHA1
41f6e35a4537dd145a25bac1c4a3835f4d26e682
-
SHA256
dc346ddbdd9fbf380829eb2b337b80963cd2078bd620dec741388eb51a2af6a3
-
SHA512
07f195d876fd3780837314769b85199ad0bc55dfbac96458eda8f906357db47fb6ffde3fb6d37a921d756e14be9a684e355a0311698a5edf5ecd0264b9b369a6
-
SSDEEP
3072:OeuvyJMduOak7cON4JFBTRDBtXSGifdZPvs76F0qCCzeztzWzHjorObO/:NuvyAakZ4rjBpCrs7ZAy0j
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4112-0-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral2/memory/4112-2-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4616 4112 WerFault.exe 84 -
Checks SCSI registry key(s) 3 TTPs 20 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters 76aa540cabd3fb9bb10485b47fc5d97f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 76aa540cabd3fb9bb10485b47fc5d97f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4112 76aa540cabd3fb9bb10485b47fc5d97f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76aa540cabd3fb9bb10485b47fc5d97f.exe"C:\Users\Admin\AppData\Local\Temp\76aa540cabd3fb9bb10485b47fc5d97f.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 3002⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4112 -ip 41121⤵PID:4396