Analysis

  • max time kernel
    25s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 14:14

General

  • Target

    Setup.exe

  • Size

    3.9MB

  • MD5

    54f17951fae1d5db228771a5fbe1d6d1

  • SHA1

    820f2034e6512ca380567ecda1f33b55b87afa1a

  • SHA256

    5455b859c0d470b3f3371eedfcff8ae0d01bfafb2445e676f18c7a34a47ab518

  • SHA512

    a8ba6f47ce49da5011a2ef332b1f5a393ca8db5303d5b0552560eb9f3b4dec68a7a2388192569296e8eca9497940de1c67885caec07cf8906eba90d06e242255

  • SSDEEP

    49152:j5o8/AXbDv/v6UCTmoHcJjTzvWGIy+iF/h8895L0mzX6ZGKjLX:q5XfLUmERiFu/

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"
      2⤵
        PID:2080
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1408-19-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-13-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-23-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-20-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-22-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-11-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-21-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-17-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-12-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/1408-18-0x00000176AD810000-0x00000176AD811000-memory.dmp

      Filesize

      4KB

    • memory/2080-5-0x00000000009F0000-0x0000000000A3C000-memory.dmp

      Filesize

      304KB

    • memory/2080-10-0x00000000009F0000-0x0000000000A3C000-memory.dmp

      Filesize

      304KB

    • memory/2080-8-0x00000000009F0000-0x0000000000A3C000-memory.dmp

      Filesize

      304KB

    • memory/2356-4-0x00007FF7C4680000-0x00007FF7C4ABA000-memory.dmp

      Filesize

      4.2MB

    • memory/2356-6-0x00007FF7C4680000-0x00007FF7C4ABA000-memory.dmp

      Filesize

      4.2MB