Analysis

  • max time kernel
    15s
  • max time network
    13s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 22:57

General

  • Target

    loader_2.exe

  • Size

    15.8MB

  • MD5

    f9ad8a7c92d0921a26e24f29930d6a5a

  • SHA1

    3b9435006ebb4e19cea30409386e0a5cdabf77c2

  • SHA256

    7e7a07eb82913a55b139630604f80586c414be285ed0e588e72f50815ab07ea4

  • SHA512

    3e7accb79af061a1895049f069877c6d30a2da7be5700bbf44b0ed2259fa689dbdf25c9a5c498414b10409fc744caebde3d5f5bd011227ebc38148486feff6fe

  • SSDEEP

    393216:YVEe/6F7EkUN3GBYzInRdGlSohPvdHbEuHL23HYQKCI:X261YWqwG4SXd7E4iIdCI

Score
10/10

Malware Config

Signatures

  • Deletes NTFS Change Journal 2 TTPs 1 IoCs

    The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\loader_2.exe
    "C:\Users\Admin\AppData\Local\Temp\loader_2.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Windows\SYSTEM32\GamePanel.exe
      GamePanel.exe
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Windows\SYSTEM32\SystemSettingsAdminFlows.exe
        SystemSettingsAdminFlows.exe SetInternetTime 1
        3⤵
          PID:2988
        • C:\Windows\SYSTEM32\sc.exe
          sc start ProfSvc
          3⤵
          • Launches sc.exe
          PID:4016
        • C:\Windows\SYSTEM32\sc.exe
          sc config ProfSvc start=auto
          3⤵
          • Launches sc.exe
          PID:2668
        • C:\Windows\SYSTEM32\taskkill.exe
          taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3888
      • C:\Windows\SYSTEM32\cmd.exe
        cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\loader_2.exe" & fsutil usn deletejournal /D C:
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Windows\system32\PING.EXE
          ping 1.1.1.1 -n 1 -w 3000
          3⤵
          • Runs ping.exe
          PID:2412
        • C:\Windows\system32\fsutil.exe
          fsutil usn deletejournal /D C:
          3⤵
          • Deletes NTFS Change Journal
          PID:4328

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Remote System Discovery

    1
    T1018

    Impact

    Inhibit System Recovery

    1
    T1490

    Data Destruction

    1
    T1485

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2940-0-0x00007FFFD9030000-0x00007FFFD9032000-memory.dmp
      Filesize

      8KB

    • memory/2940-1-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/2940-10-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/3144-5-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/3144-6-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/3144-12-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/3144-18-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/3144-17-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB

    • memory/3144-19-0x0000000140000000-0x00000001438F1000-memory.dmp
      Filesize

      56.9MB