Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
9c5ec06ffdc7e7d4896f5b9a559bc83c.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
9c5ec06ffdc7e7d4896f5b9a559bc83c.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
9c5ec06ffdc7e7d4896f5b9a559bc83c.exe
-
Size
65KB
-
MD5
9c5ec06ffdc7e7d4896f5b9a559bc83c
-
SHA1
5d787f59e038b9383fe0d682b2d64e2250240f59
-
SHA256
5b2823ce394f313bc25e94f7de59c0b5384fdc56633cc98d35d17ff03fcf9c4d
-
SHA512
4750ee076d44e0d2beec6de1d5415834cfdc51775599e66cf0529da48fb98a87a2e79c383e818dc8f5e872c27472d9781e479e74573004dc71d0e137411d1a12
-
SSDEEP
384:X1yfWTXiEH0jqjaCInxm38Y5SPfhPnR8+7wjOb04sf:lywD0jqj9Ixm3FSmZx
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9272 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msiakdolk.pif" svchost.exe -
Deletes itself 1 IoCs
pid Process 3668 svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msiakdolk.pif svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3668 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe 84 PID 2844 wrote to memory of 3668 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe 84 PID 2844 wrote to memory of 3668 2844 9c5ec06ffdc7e7d4896f5b9a559bc83c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c5ec06ffdc7e7d4896f5b9a559bc83c.exe"C:\Users\Admin\AppData\Local\Temp\9c5ec06ffdc7e7d4896f5b9a559bc83c.exe"1⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe2⤵
- Adds policy Run key to start application
- Deletes itself
- Drops file in Program Files directory
PID:3668
-