Analysis
-
max time kernel
22s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 01:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Acura.exe
Resource
win10v2004-20240611-en
5 signatures
150 seconds
General
-
Target
Acura.exe
-
Size
1.2MB
-
MD5
a12b9eaeb350dac058adb1ed74420229
-
SHA1
686d790fc201b1d565c19acb3cc5fd0742a89e53
-
SHA256
a7334c7690db35b3ae2897639e53d40b699ab8894f6a28fbc7812d0e2acab7f0
-
SHA512
f70ab61219f71bae8816497e5235fb39259f695c99528c4c6a61feedbd77428b5fecb0c54aa951e2dbd255a6c5cb2b52ed0881ba92878dbad0e2b32e21ae8e7b
-
SSDEEP
12288:5SHPIeRQQoaiy4HLGYuXSKLqSoP/Lh7cKlz3yM8KDI3Ewepte3p1cRRje:5SHPIUdoaiy4HSjXSKLPc/VCZn0K1SJ
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2544 taskmgr.exe Token: SeSystemProfilePrivilege 2544 taskmgr.exe Token: SeCreateGlobalPrivilege 2544 taskmgr.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe 2544 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Acura.exe"C:\Users\Admin\AppData\Local\Temp\Acura.exe"1⤵PID:3940
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2544