Analysis
-
max time kernel
13s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
speed/RPZ-HWID.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
speed/Speed.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
speed/SpeedLoader.exe
Resource
win10v2004-20240508-en
General
-
Target
speed/SpeedLoader.exe
-
Size
146KB
-
MD5
b39cc6df87824b6787db795689e02add
-
SHA1
5bc6335faf16d4c0f722ec7fad0b3c5699d19226
-
SHA256
ceb570329801e2abcb5e5c991e46d3c3f8e05418014e5be61562d106de2d188f
-
SHA512
f5aacbdcc1dcb50a54aa1ea844d16e09b97fb3e8f7e2ac867948b188e40c1e686c25a912c7ffe1a91d97c685179d77e99f1fddb416ca89115bbb625b81625fba
-
SSDEEP
3072:yczkitvo4BpYN/6mBPry8TXROLdW5m4mURp9OOGr0k3:yA4NCmBPry/N2NOOO
Malware Config
Signatures
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
SpeedLoader.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName = "3UTKAX" SpeedLoader.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer = "6GXP28QLYHT7YCT" SpeedLoader.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
SpeedLoader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 SpeedLoader.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "GBVBAVQZ-9I96I9TF-A" SpeedLoader.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral SpeedLoader.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral SpeedLoader.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral SpeedLoader.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeLoadDriverPrivilege 2268 svchost.exe Token: SeLoadDriverPrivilege 2268 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SpeedLoader.exedescription pid process target process PID 2332 wrote to memory of 5080 2332 SpeedLoader.exe netsh.exe PID 2332 wrote to memory of 5080 2332 SpeedLoader.exe netsh.exe PID 2332 wrote to memory of 5080 2332 SpeedLoader.exe netsh.exe PID 2332 wrote to memory of 5080 2332 SpeedLoader.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\speed\SpeedLoader.exe"C:\Users\Admin\AppData\Local\Temp\speed\SpeedLoader.exe"1⤵
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\netsh.exe"netsh" interface set interface "Ethernet" disable2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken