Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 12:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
alkad.exe
Resource
win10v2004-20240508-en
3 signatures
60 seconds
General
-
Target
alkad.exe
-
Size
3.7MB
-
MD5
cc35fa8550f2c178d0da4626b780ddf4
-
SHA1
d716cbf567c3844fe9fcbce1ea0581d1e4d71a58
-
SHA256
7a8cbaf7d7d5d3572ac4facf1b58454778bd017920e2b925ae7346d4177360a5
-
SHA512
34299430227ede6ec6d6cbd23ee0e4dc480f71ad01d5f13927d2540c24814bc51aada96e332e43f88676f44caae1351d822b0b52e5137b5b8174731203c2af4c
-
SSDEEP
98304:7uV68y0ibQPfKcoLypI/fVuSLltBTMhe0rfYxP3B8qb:iVzPfJ7IDLVMhBfCz
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe 4816 alkad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4816 alkad.exe 4816 alkad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1188 4816 alkad.exe 83 PID 4816 wrote to memory of 1188 4816 alkad.exe 83 PID 1188 wrote to memory of 2456 1188 cmd.exe 84 PID 1188 wrote to memory of 2456 1188 cmd.exe 84 PID 1188 wrote to memory of 3468 1188 cmd.exe 85 PID 1188 wrote to memory of 3468 1188 cmd.exe 85 PID 1188 wrote to memory of 1492 1188 cmd.exe 86 PID 1188 wrote to memory of 1492 1188 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\alkad.exe"C:\Users\Admin\AppData\Local\Temp\alkad.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\alkad.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\alkad.exe" MD53⤵PID:2456
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:3468
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1492
-
-