Analysis
-
max time kernel
153s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 20:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b47c3d63292255c1.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b47c3d63292255c1.exe
Resource
win10v2004-20240226-en
7 signatures
150 seconds
General
-
Target
b47c3d63292255c1.exe
-
Size
79.7MB
-
MD5
d9fed0d627814abc6e56d4cc43cc1afe
-
SHA1
79bd28ebce1f1d654bf243aabc610d6347fc3d83
-
SHA256
2dc5dca6c8a4c0ead48b6ecec215de0ff00b9f15ad0f8ccbe57df13915cab27d
-
SHA512
eab3e9e131c4cb22ad6e45a8931bb23bb62282e25d31e65a5820261e3f217f1cb2f30b56e457c956c83c77276fe361eb3c0393143ac6523e345fb3734ef04eb3
-
SSDEEP
1572864:l1dKgIKwHSigWrhahGa1fZlSAd1T0t9O2fKRxiSl3bT:vgxDSnWlp6lS6TK9sx7l
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b47c3d63292255c1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 42 raw.githubusercontent.com 38 raw.githubusercontent.com 41 raw.githubusercontent.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b47c3d63292255c1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b47c3d63292255c1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe 1300 b47c3d63292255c1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1300 b47c3d63292255c1.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1300 b47c3d63292255c1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b47c3d63292255c1.exe"C:\Users\Admin\AppData\Local\Temp\b47c3d63292255c1.exe"1⤵
- Drops file in Drivers directory
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
PID:1300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4192 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:2596