Resubmissions
08/02/2024, 09:22
240208-lcd7ssdd32 1008/02/2024, 02:25
240208-cwq62adgdl 607/02/2024, 17:55
240207-whf9fsac74 6Analysis
-
max time kernel
134s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
npp.8.6.portable.x64/contextModel.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
npp.8.6.portable.x64/contextModel.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
npp.8.6.portable.x64/notepad.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
npp.8.6.portable.x64/notepad.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
npp.8.6.portable.x64/updater/GUP.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
npp.8.6.portable.x64/updater/GUP.exe
Resource
win10v2004-20231215-en
General
-
Target
npp.8.6.portable.x64/contextModel.exe
-
Size
2.6MB
-
MD5
8f28087d8d0e716368314c2f1a159280
-
SHA1
7e383ae0f632c02ef98168b6c1a33fd449d6c393
-
SHA256
0b3731c524e6ba716f15087d85eae7e6225b6b51d4ae2fa6c142ff1523f57046
-
SHA512
aa21ab18a12a69ff25b24b1c255b0bdc7961985150b07a7f3f4b0909e212295bd781548cd8ea817f3144dfad845aff93df40a513bdb637db7b89bb08fff01eab
-
SSDEEP
49152:C+sGc1TASKVbmYIBotpg0TunuNeeigv0XIMw4h2pk4PxKS5VinRfepLm7j5:WTAfVbwotpgruNeW0VHhL3S5VicLaj5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 contextModel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier contextModel.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\shell\open\command contextModel.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\shell\open contextModel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\shell\open\command\ = "\"(null)\" -o \"%1\"" contextModel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\.MMP\ = "VMMap.Logfile.1" contextModel.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1 contextModel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\ = "VMMap Log File" contextModel.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\shell contextModel.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\DefaultIcon contextModel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\VMMap.Logfile.1\DefaultIcon\ = "\"(null)\",0" contextModel.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\.MMP contextModel.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 contextModel.exe 224 contextModel.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 224 contextModel.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\npp.8.6.portable.x64\contextModel.exe"C:\Users\Admin\AppData\Local\Temp\npp.8.6.portable.x64\contextModel.exe"1⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224