Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe
Resource
win10v2004-20240611-en
General
-
Target
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe
-
Size
702KB
-
MD5
5f53734c5153ec3dd61e2a732a2ff03f
-
SHA1
0dcfceaced0f4063af2e93cea48348b801fd0435
-
SHA256
3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76
-
SHA512
17e6b58d604e2e81385fe1e82a8d5f8eafeb1a0b749280db4010158e2acb6bd516f0c5de68d9d7aa9c509a68d3cdc2a4a21623c6dda4dd2563cfd75e1a723e0f
-
SSDEEP
12288:DdKDeq1eaihwIgHYzVQKS6f4oXjXoFGXFJ1406jowEq9+NPn7NiaswNF:YDplihwIgHYzVQWjd1J1zNMg
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\EvilDriver\ImagePath = "\\??\\C:\\Driver2030.sys" 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2816 1936 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2816 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe 30 PID 1936 wrote to memory of 2816 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe 30 PID 1936 wrote to memory of 2816 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe 30 PID 1936 wrote to memory of 2816 1936 3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe"C:\Users\Admin\AppData\Local\Temp\3ef6cc0ee34c9c5e311bdbe2cdd6af20c451582dbb2e3b9054e6e8e9e2ea6e76.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 7682⤵
- Program crash
PID:2816
-