Analysis
-
max time kernel
90s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-04-2024 18:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Forza-Mods-AIO.exe
Resource
win11-20240412-en
windows11-21h2-x64
6 signatures
150 seconds
General
-
Target
Forza-Mods-AIO.exe
-
Size
9.1MB
-
MD5
8492a03f3405e820cf601bba39e65e13
-
SHA1
254c4bf345719d239033bd0a2b623f5923d96538
-
SHA256
753d72ebbf5b257b77b27d2bcc097f1fa1476c21d15a18cf482b8dd30916efa4
-
SHA512
2662c2fd998290a4330aab1093d52937b6a04319607d68f12b457be530a31279c862062047a7589ed88f2ad47b4f94f86fa1fb4fee2558aa0ee56cef2facdddd
-
SSDEEP
49152:wYIJB/b53as1gM2bq7mTv+iru2ICLt/YUdj/g5t2gQlX03yEFNR3hIhwkm2vysyv:y151MysDlXV2phIME9o4QP7XW/sN
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2412 Forza-Mods-AIO.exe 2412 Forza-Mods-AIO.exe 2412 Forza-Mods-AIO.exe 2412 Forza-Mods-AIO.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2412 Forza-Mods-AIO.exe Token: SeDebugPrivilege 1832 taskmgr.exe Token: SeSystemProfilePrivilege 1832 taskmgr.exe Token: SeCreateGlobalPrivilege 1832 taskmgr.exe Token: 33 1832 taskmgr.exe Token: SeIncBasePriorityPrivilege 1832 taskmgr.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe -
Suspicious use of SendNotifyMessage 40 IoCs
pid Process 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Forza-Mods-AIO.exe"C:\Users\Admin\AppData\Local\Temp\Forza-Mods-AIO.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4196
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1832