Resubmissions

24-10-2024 14:15

241024-rkkmfavbjq 10

18-03-2024 15:46

240318-s74jhacc94 10

18-03-2024 15:46

240318-s7l98ach3w 10

Analysis

  • max time kernel
    75s
  • max time network
    32s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-03-2024 15:46

General

  • Target

    2664-0-0x0000000001070000-0x0000000001E58000-memory.exe

  • Size

    13.9MB

  • MD5

    a799b2c3efdf9d684740448650217463

  • SHA1

    18f92a74382bde73f7d06ac7245663823253b7d7

  • SHA256

    d9033b9ce6e72e3a46754c626358c008225855ba0b7805092af342eaf02d6e43

  • SHA512

    f0b55daaa47c2051012cb00c0964a0356c372159e72325e058e603758c7d2d6e19c9c9e4fc67f89eb29b9ddd78c5a14aa036233e97d66f6b490a2128cf7d0740

  • SSDEEP

    196608:ngrlG8syCHeuRCBJ54kJnXlES7XSqmIpRH90fjxyCKYCthjUMGV7EGEjXig:gxG805o4WnL7u2+BEjBi

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2664-0-0x0000000001070000-0x0000000001E58000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2664-0-0x0000000001070000-0x0000000001E58000-memory.exe"
    1⤵
      PID:4624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 8
        2⤵
        • Program crash
        PID:1072
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4624 -ip 4624
      1⤵
        PID:4616
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /0
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2500
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:4176
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:4820
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:4716
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:228
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x0000000000000494
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3856
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0 /state0:0xa39dd055 /state1:0x41c64e6d
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:3860
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:2864

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2500-0-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-1-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-2-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-7-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-6-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-8-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-9-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-10-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-11-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB

        • memory/2500-12-0x00000247E4200000-0x00000247E4201000-memory.dmp

          Filesize

          4KB