Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 13:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ahhh.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
ahhh.exe
Resource
win10v2004-20240412-en
4 signatures
150 seconds
General
-
Target
ahhh.exe
-
Size
891KB
-
MD5
1a04d364ae32579b5f9d7fa623c4d819
-
SHA1
132be687523dc2ae8e450a098ed4abb812899cce
-
SHA256
4a6dbc1339c6c3e673c65acd0625ba7d75b49076de2b768ec3c5b0e66dca573e
-
SHA512
0f9fa219e91981794199a5496614f433c66f3a73e3365328a2561a446abdda38ee5386486aa0da56ebbab4e13857c3f6dab020167e6b98ecc53c031cfe6af85a
-
SSDEEP
24576:0uqZH8X/Q9zRmjpdWh0lhSMXlicPLRG8JWK0:zqZHLFRIpdjxLRGk
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" ahhh.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3384 ahhh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3384 ahhh.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3384 wrote to memory of 3312 3384 ahhh.exe 88 PID 3384 wrote to memory of 3312 3384 ahhh.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ahhh.exe"C:\Users\Admin\AppData\Local\Temp\ahhh.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color B2⤵PID:3312
-