Analysis
-
max time kernel
210s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 15:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
version-5e534e6db34e447e.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
version-5e534e6db34e447e.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
version-5e534e6db34e447e.exe
-
Size
1.9MB
-
MD5
6d85f29c6c6967c3c2efcc5fe662926b
-
SHA1
b512f8e18d134bd07f3a3693bb28b6c3f18d5405
-
SHA256
5cdc5ec49208506dbb6c37c8c20a23a40dadd6ea2e42de363b56869da63aa552
-
SHA512
19da87234fa5e962cec7cc21f70d9f26b78b8c1043dabf5964740b722fadd691cbf91d2e4cb1c644a2c1ea1a0d64ad48dddbdb98c19ebb84e8cb15596657ba67
-
SSDEEP
49152:Yzv49bQkkAZ7ZDuHKKR5U73BGXwUnQ3SJtrBmO7iReEL:AvPJABwOyJ3t7Ke
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" version-5e534e6db34e447e.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1640 version-5e534e6db34e447e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1640 version-5e534e6db34e447e.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2824 1640 version-5e534e6db34e447e.exe 29 PID 1640 wrote to memory of 2824 1640 version-5e534e6db34e447e.exe 29 PID 1640 wrote to memory of 2824 1640 version-5e534e6db34e447e.exe 29 PID 1640 wrote to memory of 2924 1640 version-5e534e6db34e447e.exe 30 PID 1640 wrote to memory of 2924 1640 version-5e534e6db34e447e.exe 30 PID 1640 wrote to memory of 2924 1640 version-5e534e6db34e447e.exe 30 PID 2924 wrote to memory of 1984 2924 cmd.exe 31 PID 2924 wrote to memory of 1984 2924 cmd.exe 31 PID 2924 wrote to memory of 1984 2924 cmd.exe 31 PID 2924 wrote to memory of 2456 2924 cmd.exe 32 PID 2924 wrote to memory of 2456 2924 cmd.exe 32 PID 2924 wrote to memory of 2456 2924 cmd.exe 32 PID 2924 wrote to memory of 2936 2924 cmd.exe 33 PID 2924 wrote to memory of 2936 2924 cmd.exe 33 PID 2924 wrote to memory of 2936 2924 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe"C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 9F2⤵PID:2824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe" MD53⤵PID:1984
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2456
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2936
-
-