Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 15:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
version-5e534e6db34e447e.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
version-5e534e6db34e447e.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
version-5e534e6db34e447e.exe
-
Size
1.9MB
-
MD5
6d85f29c6c6967c3c2efcc5fe662926b
-
SHA1
b512f8e18d134bd07f3a3693bb28b6c3f18d5405
-
SHA256
5cdc5ec49208506dbb6c37c8c20a23a40dadd6ea2e42de363b56869da63aa552
-
SHA512
19da87234fa5e962cec7cc21f70d9f26b78b8c1043dabf5964740b722fadd691cbf91d2e4cb1c644a2c1ea1a0d64ad48dddbdb98c19ebb84e8cb15596657ba67
-
SSDEEP
49152:Yzv49bQkkAZ7ZDuHKKR5U73BGXwUnQ3SJtrBmO7iReEL:AvPJABwOyJ3t7Ke
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" version-5e534e6db34e447e.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3100 version-5e534e6db34e447e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3100 version-5e534e6db34e447e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1800 3100 version-5e534e6db34e447e.exe 84 PID 3100 wrote to memory of 1800 3100 version-5e534e6db34e447e.exe 84 PID 3100 wrote to memory of 3204 3100 version-5e534e6db34e447e.exe 87 PID 3100 wrote to memory of 3204 3100 version-5e534e6db34e447e.exe 87 PID 3204 wrote to memory of 4988 3204 cmd.exe 88 PID 3204 wrote to memory of 4988 3204 cmd.exe 88 PID 3204 wrote to memory of 2108 3204 cmd.exe 89 PID 3204 wrote to memory of 2108 3204 cmd.exe 89 PID 3204 wrote to memory of 2412 3204 cmd.exe 90 PID 3204 wrote to memory of 2412 3204 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe"C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Color 9F2⤵PID:1800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\version-5e534e6db34e447e.exe" MD53⤵PID:4988
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:2108
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2412
-
-