Analysis
-
max time kernel
210s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 00:55
Behavioral task
behavioral1
Sample
Deadly Team and VBR Cracked by SobFoX.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Deadly Team and VBR Cracked by SobFoX.zip
Resource
win10v2004-20240226-en
General
-
Target
Deadly Team and VBR Cracked by SobFoX.zip
-
Size
5.6MB
-
MD5
0e88574b3a438a440bcb6ff128c1ccd6
-
SHA1
f129feeee9950e9bc24954888ac80573d7839184
-
SHA256
c603a87cacf12026db4d215e466599ca52f495334eb78fb438aaaa834437f5f1
-
SHA512
e41ff983d76ad12ad98c25b2ce0cfe0620c22286548896bfb5d0172e573a9cb092d1439d5564733f3a99b62451ad95bdacb73b1fa2b19c21ef7873740e89fc33
-
SSDEEP
98304:KpLVv28w/9eROXezMjNwwiIekrPSqjrr7sVNu2MZPHaIU5zi5D8KbkFPlvj5LO3Q:KpL88Q9eYNO/qSqsN5MZPHaIU5zi51k1
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
taskmgr.exepid process 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 524 taskmgr.exe Token: SeSystemProfilePrivilege 524 taskmgr.exe Token: SeCreateGlobalPrivilege 524 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
Processes:
taskmgr.exepid process 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
Processes:
taskmgr.exepid process 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe 524 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Deadly Team and VBR Cracked by SobFoX.zip"1⤵PID:2964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1348 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:81⤵PID:4740
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4772
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:524