Resubmissions

07-05-2024 09:02

240507-kznjbacc84 1

28-03-2024 16:59

240328-vhp1xsbb7z 1

Analysis

  • max time kernel
    591s
  • max time network
    594s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2024 09:02

General

  • Target

    08ed58049fc535a7f3bfd549f059d33df055c05aba47fa17afd53a81173102e5.exe

  • Size

    5.2MB

  • MD5

    62e47901c0992ba6a7e5400a13147f97

  • SHA1

    ac29387f3d85f1c01e08677efdb6856c893aebb9

  • SHA256

    08ed58049fc535a7f3bfd549f059d33df055c05aba47fa17afd53a81173102e5

  • SHA512

    3ce2b19d8fb3ba0b4baf6ec67d2e003be3610706ba7e4576f3a6c75c5d92961db4f5fd5ec97471ed304dace7a15fd26e59d6d0cd86016f7959de95ddf48a4499

  • SSDEEP

    98304:EcfIsitk1BPhucFNMAXe0PE0PRc0PKvxVxJGF:EcfIsqkVuctbV6xV0

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08ed58049fc535a7f3bfd549f059d33df055c05aba47fa17afd53a81173102e5.exe
    "C:\Users\Admin\AppData\Local\Temp\08ed58049fc535a7f3bfd549f059d33df055c05aba47fa17afd53a81173102e5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4284
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:5108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4284-0-0x0000000001050000-0x0000000001051000-memory.dmp

    Filesize

    4KB

  • memory/4284-1-0x0000000000400000-0x0000000000E31000-memory.dmp

    Filesize

    10.2MB

  • memory/4284-4-0x0000000001050000-0x0000000001051000-memory.dmp

    Filesize

    4KB

  • memory/5108-14-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-15-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-16-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-26-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-25-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-24-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-23-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-22-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-21-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB

  • memory/5108-20-0x0000027D8C050000-0x0000027D8C051000-memory.dmp

    Filesize

    4KB