Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 00:10
Behavioral task
behavioral1
Sample
bd291342f9e67e12cfc6ba494b95be43.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
bd291342f9e67e12cfc6ba494b95be43.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
bd291342f9e67e12cfc6ba494b95be43.exe
-
Size
3.8MB
-
MD5
bd291342f9e67e12cfc6ba494b95be43
-
SHA1
477df3d4bc80e5a41ac22fa5fc0b652511e43907
-
SHA256
4bddc1b65b7a24af3d24bddcd3722811775f3f98a65fbc433c762e1615af28c1
-
SHA512
112a93d5dbde66ff17c601c72e7aeabd5bb54f506cda5173d3d6e2213b4c52fd53ff8ca4706440a457dedae40028bec1e664e343049e9930dc1c91f344f9760d
-
SSDEEP
98304:877Pmq33rE/JDLPWZADUGer7B6iY74M/zmlwXVZaFB:K+R/eZADUXR
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmzr = "C:\\Users\\Admin\\AppData\\Local\\sazpclv\\wmzr.exe" bd291342f9e67e12cfc6ba494b95be43.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmzr = "C:\\Users\\Admin\\AppData\\Local\\sazpclv\\wmzr.exe攀" bd291342f9e67e12cfc6ba494b95be43.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe -
Suspicious behavior: RenamesItself 30 IoCs
pid Process 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4608 bd291342f9e67e12cfc6ba494b95be43.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4608 bd291342f9e67e12cfc6ba494b95be43.exe 4608 bd291342f9e67e12cfc6ba494b95be43.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd291342f9e67e12cfc6ba494b95be43.exe"C:\Users\Admin\AppData\Local\Temp\bd291342f9e67e12cfc6ba494b95be43.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4608