Overview
overview
3Static
static
3_16ec2e4e-..._2.zip
windows10-1703-x64
1_16ec2e4e-...67.zip
windows10-1703-x64
1_16ec2e4e-...67.zip
windows10-1703-x64
116ec2e4e-6...67.xml
windows10-1703-x64
1CyveraSystem.reg
windows10-1703-x64
1Logs/Traps...tl.001
windows10-1703-x64
3Logs/Traps...tl.002
windows10-1703-x64
3Logs/Traps...tl.003
windows10-1703-x64
3Logs/Traps...tl.001
windows10-1703-x64
3Logs/Traps...tl.002
windows10-1703-x64
3Logs/Traps...tl.003
windows10-1703-x64
3Logs/Traps...tl.004
windows10-1703-x64
3Logs/Traps...tl.001
windows10-1703-x64
3Logs/Traps...tl.002
windows10-1703-x64
3Logs/Traps...tl.003
windows10-1703-x64
3Logs/Traps...tl.001
windows10-1703-x64
3Logs/Traps...tl.002
windows10-1703-x64
3Logs/Traps...tl.003
windows10-1703-x64
3Logs/adapt...log.gz
windows10-1703-x64
3Logs/adapt...log.gz
windows10-1703-x64
3Logs/adapt...log.gz
windows10-1703-x64
3Logs/adapt...log.gz
windows10-1703-x64
3Logs/adapt...log.gz
windows10-1703-x64
3Logs/adapt...cy.log
windows10-1703-x64
1Logs/corte...ad.log
windows10-1703-x64
1Logs/cytool.log
windows10-1703-x64
1Logs/cytoo...rb.log
windows10-1703-x64
1Logs/foren...ts.log
windows10-1703-x64
1Logs/foren....log.1
windows10-1703-x64
3Logs/foren....log.2
windows10-1703-x64
3Logs/foren....log.3
windows10-1703-x64
3Logs/foren....log.4
windows10-1703-x64
3Analysis
-
max time kernel
124s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
18/03/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
_16ec2e4e-6cf7-4e69-b2f3-676c8263db67_2.zip
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
_16ec2e4e-6cf7-4e69-b2f3-676c8263db67.zip
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
_16ec2e4e-6cf7-4e69-b2f3-676c8263db67.zip
Resource
win10-20240221-en
Behavioral task
behavioral4
Sample
16ec2e4e-6cf7-4e69-b2f3-676c8263db67.xml
Resource
win10-20240221-en
Behavioral task
behavioral5
Sample
CyveraSystem.reg
Resource
win10-20240221-en
Behavioral task
behavioral6
Sample
Logs/Traps_native_log.8.1.0.41560.etl.001
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Logs/Traps_native_log.8.1.0.41560.etl.002
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
Logs/Traps_native_log.8.1.0.41560.etl.003
Resource
win10-20240221-en
Behavioral task
behavioral9
Sample
Logs/Traps_native_log.8.1.1.43337.etl.001
Resource
win10-20240221-en
Behavioral task
behavioral10
Sample
Logs/Traps_native_log.8.1.1.43337.etl.002
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
Logs/Traps_native_log.8.1.1.43337.etl.003
Resource
win10-20240221-en
Behavioral task
behavioral12
Sample
Logs/Traps_native_log.8.1.1.43337.etl.004
Resource
win10-20240221-en
Behavioral task
behavioral13
Sample
Logs/Traps_native_log.8.1.2.47081.etl.001
Resource
win10-20240221-en
Behavioral task
behavioral14
Sample
Logs/Traps_native_log.8.1.2.47081.etl.002
Resource
win10-20240214-en
Behavioral task
behavioral15
Sample
Logs/Traps_native_log.8.1.2.47081.etl.003
Resource
win10-20240221-en
Behavioral task
behavioral16
Sample
Logs/Traps_native_log.8.2.0.46986.etl.001
Resource
win10-20240221-en
Behavioral task
behavioral17
Sample
Logs/Traps_native_log.8.2.0.46986.etl.002
Resource
win10-20240221-en
Behavioral task
behavioral18
Sample
Logs/Traps_native_log.8.2.0.46986.etl.003
Resource
win10-20240221-en
Behavioral task
behavioral19
Sample
Logs/adaptive_policy.1.log.gz
Resource
win10-20240221-en
Behavioral task
behavioral20
Sample
Logs/adaptive_policy.2.log.gz
Resource
win10-20240221-en
Behavioral task
behavioral21
Sample
Logs/adaptive_policy.3.log.gz
Resource
win10-20240221-en
Behavioral task
behavioral22
Sample
Logs/adaptive_policy.4.log.gz
Resource
win10-20240221-en
Behavioral task
behavioral23
Sample
Logs/adaptive_policy.5.log.gz
Resource
win10-20240221-en
Behavioral task
behavioral24
Sample
Logs/adaptive_policy.log
Resource
win10-20240221-en
Behavioral task
behavioral25
Sample
Logs/cortex-xdr-payload.log
Resource
win10-20240221-en
Behavioral task
behavioral26
Sample
Logs/cytool.log
Resource
win10-20240221-en
Behavioral task
behavioral27
Sample
Logs/cytool.taylorb.log
Resource
win10-20240221-en
Behavioral task
behavioral28
Sample
Logs/forensic_scripts.log
Resource
win10-20240214-en
Behavioral task
behavioral29
Sample
Logs/forensic_scripts.log.1
Resource
win10-20240221-en
Behavioral task
behavioral30
Sample
Logs/forensic_scripts.log.2
Resource
win10-20240221-en
Behavioral task
behavioral31
Sample
Logs/forensic_scripts.log.3
Resource
win10-20240221-en
Behavioral task
behavioral32
Sample
Logs/forensic_scripts.log.4
Resource
win10-20240221-en
General
-
Target
Logs/adaptive_policy.5.log.gz
-
Size
314KB
-
MD5
989168b0d553161e3c1e15b926b9691c
-
SHA1
6e68e0926bfd75c705d9c3138d6125bf030df333
-
SHA256
60548367b77eff6a407601f024979a2952292a01f8ac6c325753b5b5a78273c0
-
SHA512
b2b8244f33381392cbd54ec776bb57f46b0d0c2b00ba0b14e4319b6c5041ce4b158081cb512b2e60e5b060d8899432a2006c8a5a39c09c841c31d6daa33feb10
-
SSDEEP
6144:7StpIDXHVEls3cjmpwuIBDFEdy+rbp0/Te6w8laOQPCm:YsGlQWuSZEdyYy/w8laOI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4696 7zFM.exe Token: 35 4696 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4696 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4696 3180 cmd.exe 75 PID 3180 wrote to memory of 4696 3180 cmd.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Logs\adaptive_policy.5.log.gz1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Logs\adaptive_policy.5.log.gz"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4696
-