Analysis
-
max time kernel
441s -
max time network
446s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/02/2024, 12:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
New Client2.exe
Resource
win11-20231215-en
7 signatures
600 seconds
General
-
Target
New Client2.exe
-
Size
249KB
-
MD5
275d3280a5b113e3ea7a31acfd2da2c4
-
SHA1
6884bd0ac28ed66dbec6a53fef9e216b6ac5b968
-
SHA256
145201f33592fec38741884fb0c2f148363c65e648052341024ce7a8e51de718
-
SHA512
1aea3464093a7b2f03385480b18b56b5f51582943589c56639408afd3b9ee06ebd3940d4808f39d2b4dc7696138ab6324c3f8dc386668b4135f3d8a133c6753a
-
SSDEEP
6144:W7cbwiSmfoNgNJWQZLLN99y9vK6xzcTMJiAa:ENOUSKgg0
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 4044 TASKKILL.exe 1944 TASKKILL.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings New Client2.exe Key created \REGISTRY\USER\S-1-5-21-3632047111-1948211978-3010235048-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe 3800 New Client2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3800 New Client2.exe Token: SeDebugPrivilege 1944 TASKKILL.exe Token: SeDebugPrivilege 4044 TASKKILL.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4664 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4044 3800 New Client2.exe 78 PID 3800 wrote to memory of 4044 3800 New Client2.exe 78 PID 3800 wrote to memory of 4044 3800 New Client2.exe 78 PID 3800 wrote to memory of 1944 3800 New Client2.exe 79 PID 3800 wrote to memory of 1944 3800 New Client2.exe 79 PID 3800 wrote to memory of 1944 3800 New Client2.exe 79 PID 3800 wrote to memory of 1896 3800 New Client2.exe 84 PID 3800 wrote to memory of 1896 3800 New Client2.exe 84 PID 3800 wrote to memory of 1896 3800 New Client2.exe 84 PID 1896 wrote to memory of 3412 1896 cmd.exe 86 PID 1896 wrote to memory of 3412 1896 cmd.exe 86 PID 1896 wrote to memory of 3412 1896 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Client2.exe"C:\Users\Admin\AppData\Local\Temp\New Client2.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\New Client2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵PID:3412
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4664