Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 02:11
Behavioral task
behavioral1
Sample
ba41737ba6cd5fdccbc44e30defafe90.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ba41737ba6cd5fdccbc44e30defafe90.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
9 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
ba41737ba6cd5fdccbc44e30defafe90.exe
-
Size
53KB
-
MD5
ba41737ba6cd5fdccbc44e30defafe90
-
SHA1
c0a0f2ee0bc32fd20e64dd2c825198a579bb500c
-
SHA256
e4f963a3fc888eccdab435a0153f4621d5fe1c1f1acfaf51e015f6668fb70b97
-
SHA512
f8a2ce66d3c6cd06fbbe2560fbc5723d7b76f86d1aaad1a1e6e38dbdf7ef14e288d41ba2991494beb1f4498e997938bb1882f773abf6cfbdafc013a305f001bf
-
SSDEEP
768:cxqUFEixuzAhmnHsIogUoYvwusQg279uqNpywol39iN6Y7XKoJS4PD:5UtxDV0Ubvwus5mcwpyX5KL
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2184-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2184-4-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\1932815455 = "C:\\Users\\Admin\\1932815455\\1932815455.EXE" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2612 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2892 shutdown.exe Token: SeRemoteShutdownPrivilege 2892 shutdown.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2892 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 28 PID 2184 wrote to memory of 2892 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 28 PID 2184 wrote to memory of 2892 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 28 PID 2184 wrote to memory of 2892 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 28 PID 2184 wrote to memory of 2256 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 30 PID 2184 wrote to memory of 2256 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 30 PID 2184 wrote to memory of 2256 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 30 PID 2184 wrote to memory of 2256 2184 ba41737ba6cd5fdccbc44e30defafe90.exe 30 PID 2256 wrote to memory of 2612 2256 cmd.exe 33 PID 2256 wrote to memory of 2612 2256 cmd.exe 33 PID 2256 wrote to memory of 2612 2256 cmd.exe 33 PID 2256 wrote to memory of 2612 2256 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba41737ba6cd5fdccbc44e30defafe90.exe"C:\Users\Admin\AppData\Local\Temp\ba41737ba6cd5fdccbc44e30defafe90.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /R /T 04 /F2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REg ADd HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 1932815455 /d "C:\Users\Admin\1932815455\1932815455.EXE" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\reg.exeREg ADd HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 1932815455 /d "C:\Users\Admin\1932815455\1932815455.EXE" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2612
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2528
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2428