Analysis
-
max time kernel
186s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 19:45
Static task
static1
Behavioral task
behavioral1
Sample
winrar-x64-701.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
winrar-x64-701.exe
Resource
win10v2004-20240508-en
General
-
Target
winrar-x64-701.exe
-
Size
3.8MB
-
MD5
46c17c999744470b689331f41eab7df1
-
SHA1
b8a63127df6a87d333061c622220d6d70ed80f7c
-
SHA256
c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
-
SHA512
4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
SSDEEP
98304:6NRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:sR/gmeOqv7Ac9F0kB
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "233" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1848 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1848 POWERPNT.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3844 taskmgr.exe Token: SeSystemProfilePrivilege 3844 taskmgr.exe Token: SeCreateGlobalPrivilege 3844 taskmgr.exe Token: 33 3844 taskmgr.exe Token: SeIncBasePriorityPrivilege 3844 taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe 3844 taskmgr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4764 winrar-x64-701.exe 4764 winrar-x64-701.exe 1848 POWERPNT.EXE 1848 POWERPNT.EXE 1848 POWERPNT.EXE 1848 POWERPNT.EXE 1848 POWERPNT.EXE 3168 LogonUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4764
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3844
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\fd7ac0bee08841a0905b64532fdabad3 /t 3992 /p 47641⤵PID:4756
-
C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1848
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3897055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3168