Analysis

  • max time kernel
    85s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 18:40

General

  • Target

    putin.exe

  • Size

    1.3MB

  • MD5

    1181b60d1b2f613141858e09f5baed74

  • SHA1

    c1ad5d6e20153c60310059110d2981c5551f32f5

  • SHA256

    a54871a86ea0ab334357133661e3e5b36e8b03e91f6037639315e109499339a7

  • SHA512

    1aec1047cd576325e2ceb62e98a1e1349e3cf2fdd2393cb22f36af253f66df426fbf94e697e43d4ddcff1d2f6be1c930c18632c4ebdb5c9f312879a451250117

  • SSDEEP

    24576:ZXeNLwOs5l6z5vsVq3OnxTHZscDtY2t43QeUFZP7VgK:VeQlmsV/dlDFXeUFB7VL

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\putin.exe
    "C:\Users\Admin\AppData\Local\Temp\putin.exe"
    1⤵
      PID:1516
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1516-0-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

      Filesize

      4KB

    • memory/1516-1-0x00000000001C0000-0x000000000030C000-memory.dmp

      Filesize

      1.3MB

    • memory/1516-2-0x0000000005110000-0x00000000056B4000-memory.dmp

      Filesize

      5.6MB

    • memory/1516-3-0x0000000004C00000-0x0000000004C92000-memory.dmp

      Filesize

      584KB

    • memory/1516-4-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

      Filesize

      40KB

    • memory/1516-5-0x0000000074BA0000-0x0000000075350000-memory.dmp

      Filesize

      7.7MB

    • memory/1516-6-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

      Filesize

      4KB

    • memory/1516-7-0x0000000074BA0000-0x0000000075350000-memory.dmp

      Filesize

      7.7MB

    • memory/4196-8-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-10-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-9-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-15-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-20-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-19-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-18-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-17-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-16-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB

    • memory/4196-14-0x00000164A8910000-0x00000164A8911000-memory.dmp

      Filesize

      4KB