Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 13:46

General

  • Target

    Pepsi Nova.exe

  • Size

    24KB

  • MD5

    1144018abd6127edd733b90871c752f1

  • SHA1

    57d094917420528b9e816cc8dbc69ab28b915644

  • SHA256

    7a40a203108bc4afb664f904a98ae48832ad4b2cfc7b654d8e65595d896a2cd8

  • SHA512

    ec3de323d7df331dc6718b3b9c960bcb1df059ffb0aea59c2a958537b3399f79ee1a36c50f9add659bcc580a03ac9cc31f5afdd1e32f11ebba3256b08d2a633f

  • SSDEEP

    384:s6KDFHelj4SsoNMuE1XFqPq+7BqIYd3qDapodfB353Qvrrz7nXht:Uh0srZ1XFy7BqIYd3qhdfB35g/z7

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Drops file in System32 directory 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pepsi Nova.exe
    "C:\Users\Admin\AppData\Local\Temp\Pepsi Nova.exe"
    1⤵
    • Drops file in System32 directory
    PID:5056
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2008
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3756,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=4084 /prefetch:8
    1⤵
      PID:984
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2224
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
          PID:4440
        • C:\Windows\system32\taskmgr.exe
          "C:\Windows\system32\taskmgr.exe" /4
          1⤵
            PID:4584

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\System32\jpzkqk.exe

            Filesize

            7.2MB

            MD5

            f6d8913637f1d5d2dc846de70ce02dc5

            SHA1

            5fc9c6ab334db1f875fbc59a03f5506c478c6c3e

            SHA256

            4e72ca1baee2c7c0f50a42614d101159a9c653a8d6f7498f7bf9d7026c24c187

            SHA512

            21217a0a0eca58fc6058101aa69cf30d5dbe419c21fa7a160f44d8ebbcf5f4011203542c8f400a9bb8ee3826706417f2939c402f605817df597b7ff812b43036

          • memory/2008-13-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-14-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-12-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-24-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-23-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-22-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-21-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-20-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-19-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB

          • memory/2008-18-0x0000019202400000-0x0000019202401000-memory.dmp

            Filesize

            4KB