Overview
overview
10Static
static
9qL7tumRgxLj.zip
windows7-x64
1qL7tumRgxLj.zip
windows10-2004-x64
1README.txt
windows7-x64
1README.txt
windows10-2004-x64
1openMe.rar
windows7-x64
3openMe.rar
windows10-2004-x64
3Boostrap/Solara X.exe
windows7-x64
10Boostrap/Solara X.exe
windows10-2004-x64
10$TEMP/Animated
windows7-x64
1$TEMP/Animated
windows10-2004-x64
1$TEMP/Bennett
windows7-x64
1$TEMP/Bennett
windows10-2004-x64
1$TEMP/Broker
windows7-x64
1$TEMP/Broker
windows10-2004-x64
1$TEMP/Dell
windows7-x64
1$TEMP/Dell
windows10-2004-x64
1$TEMP/Departments
windows7-x64
1$TEMP/Departments
windows10-2004-x64
1$TEMP/Grow
windows7-x64
1$TEMP/Grow
windows10-2004-x64
1$TEMP/Implementing
windows7-x64
1$TEMP/Implementing
windows10-2004-x64
1$TEMP/Int
windows7-x64
1$TEMP/Int
windows10-2004-x64
1$TEMP/Invalid
windows7-x64
1$TEMP/Invalid
windows10-2004-x64
1$TEMP/Italiano
windows7-x64
1$TEMP/Italiano
windows10-2004-x64
1$TEMP/Jd
windows7-x64
1$TEMP/Jd
windows10-2004-x64
1$TEMP/Latitude
windows7-x64
1$TEMP/Latitude
windows10-2004-x64
1Analysis
-
max time kernel
62s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 08:53
Behavioral task
behavioral1
Sample
qL7tumRgxLj.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
qL7tumRgxLj.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
openMe.rar
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
openMe.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Boostrap/Solara X.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Boostrap/Solara X.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$TEMP/Animated
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$TEMP/Animated
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$TEMP/Bennett
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$TEMP/Bennett
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$TEMP/Broker
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$TEMP/Broker
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$TEMP/Dell
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
$TEMP/Dell
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
$TEMP/Departments
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$TEMP/Departments
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
$TEMP/Grow
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
$TEMP/Grow
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
$TEMP/Implementing
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$TEMP/Implementing
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$TEMP/Int
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
$TEMP/Int
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
$TEMP/Invalid
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
$TEMP/Invalid
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
$TEMP/Italiano
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
$TEMP/Italiano
Resource
win10v2004-20240611-en
Behavioral task
behavioral29
Sample
$TEMP/Jd
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
$TEMP/Jd
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$TEMP/Latitude
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
$TEMP/Latitude
Resource
win10v2004-20240611-en
General
-
Target
$TEMP/Animated
-
Size
758B
-
MD5
9e7034ba6a81913f5b5ee153c4d7c722
-
SHA1
f55a2ec5745b729b0e3bb5819770b6c1bcb4c50d
-
SHA256
7e402856523567cbf9cb27e7e6c8b25544648d0aa362dc66f9045afde63c260b
-
SHA512
b25f37327d1348158d324fe9be11ba3d35762af2603554508b7bd950153e34321712b564fb9c62387836b46dc2b8c4da54edcd13a1cba5882b286c049ee4920f
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
taskmgr.exepid process 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 5220 taskmgr.exe Token: SeSystemProfilePrivilege 5220 taskmgr.exe Token: SeCreateGlobalPrivilege 5220 taskmgr.exe Token: 33 5220 taskmgr.exe Token: SeIncBasePriorityPrivilege 5220 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
Processes:
taskmgr.exepid process 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
taskmgr.exepid process 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe 5220 taskmgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$TEMP\Animated1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5220-0-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-2-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-1-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-12-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-11-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-10-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-9-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-8-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-7-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB
-
memory/5220-6-0x0000024129C70000-0x0000024129C71000-memory.dmpFilesize
4KB