Resubmissions

26-02-2024 17:10

240226-vpvjzsbh8x 10

26-02-2024 17:07

240226-vm4pwabh5v 10

19-02-2024 16:49

240219-vbqnwage7y 10

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 17:07

General

  • Target

    240219-tf7brafh73_pw_infected.zip

  • Size

    3.3MB

  • MD5

    a48e102a737c9c3506a98d766e466195

  • SHA1

    13ce0d69d73a537e7745e47706aab5508f231dde

  • SHA256

    07277482c7598874910acd36595298a91c63ac15986d4caf3b10c85833101336

  • SHA512

    05e57c4d94f45c8c99910e5b802bb20758137bfb8a15b9b18a58f173847b90818b919c6c4c5a9ba7cd6a6991773cd2ce01ba454e56b09f19898ab64435bb6066

  • SSDEEP

    49152:i+c0LBMP9X1iWaaVKd0jbkQy1uycb+xyIN+2kH+IRHVoAicMRD9zJthV:nBMlg/kKuf4BcbwyMIR1oLhzfhV

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\240219-tf7brafh73_pw_infected.zip
    1⤵
      PID:1104
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/924-0-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-1-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-2-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-7-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-6-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-8-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-12-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-11-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-10-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB

    • memory/924-9-0x000001B307E60000-0x000001B307E61000-memory.dmp

      Filesize

      4KB