Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 15:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
file.exe
-
Size
818KB
-
MD5
272f79d7dba64ba20220bb1defc4839e
-
SHA1
400167cf29c6724242d427c7d4bf5269098521c5
-
SHA256
f213641d9a278bd07f490d237d7b51f77f106fd345a8627a955904f3757b9d8b
-
SHA512
abd7f51cc69148b0dc4732e4649447c1a654252b9a1cd49ec78a26d1dc26e176101b9a888515335488fcd595b9da5c288a6be999c133550b894cb299a18a991f
-
SSDEEP
24576:Sv7C3c6roXM/Qm39KcZvCooxgxUpClDffxh5gtY+VTkC:SzooX8JhZvIxgxKClDxh5gtY+VTk
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3452 set thread context of 876 3452 file.exe 95 PID 876 set thread context of 3444 876 file.exe 56 PID 876 set thread context of 4920 876 file.exe 98 PID 4920 set thread context of 3444 4920 convert.exe 56 PID 4920 set thread context of 3696 4920 convert.exe 107 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier convert.exe -
description ioc Process Key created \Registry\User\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 convert.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3452 file.exe 3452 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 876 file.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 876 file.exe 3444 Explorer.EXE 3444 Explorer.EXE 4920 convert.exe 4920 convert.exe 4920 convert.exe 4920 convert.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 3452 file.exe Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3452 wrote to memory of 876 3452 file.exe 95 PID 3452 wrote to memory of 876 3452 file.exe 95 PID 3452 wrote to memory of 876 3452 file.exe 95 PID 3452 wrote to memory of 876 3452 file.exe 95 PID 3452 wrote to memory of 876 3452 file.exe 95 PID 3452 wrote to memory of 876 3452 file.exe 95 PID 3444 wrote to memory of 4920 3444 Explorer.EXE 98 PID 3444 wrote to memory of 4920 3444 Explorer.EXE 98 PID 3444 wrote to memory of 4920 3444 Explorer.EXE 98 PID 4920 wrote to memory of 3696 4920 convert.exe 107 PID 4920 wrote to memory of 3696 4920 convert.exe 107
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:876
-
-
-
C:\Windows\SysWOW64\convert.exe"C:\Windows\SysWOW64\convert.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3696
-
-