Resubmissions
20/06/2024, 04:20
240620-eydd3aycpf 8Analysis
-
max time kernel
48s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 04:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1kdmapperwithdriver.exe
Resource
win7-20240611-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
1kdmapperwithdriver.exe
Resource
win10v2004-20240611-en
3 signatures
150 seconds
General
-
Target
1kdmapperwithdriver.exe
-
Size
178KB
-
MD5
8f5a742238b9db460a583b01f23d72e3
-
SHA1
f1e4631193b3acea024a30f5f1652797949b0452
-
SHA256
b8d07af39d72c2f6a65bac410580a5128b0f038928f93d74a8cba5addb5a0985
-
SHA512
1aedef80cbe89bcd349bfdd127aeb2fbaa8bb9b367c6feee923fe2ec7fd3aa0c008c58ba194ef26f4d502e3fb10af813e0f9abd2ad76f3b2847cc323650514d2
-
SSDEEP
3072:Y6+fyUkRKKfW5dl0T3GEq/GiQc5GpzD+NnxMHzfvbIFKh0kEpm9rxmJTQSaMm5/7:xqyUyKKe5dlSWEqOiR5YzCJxMTfvUC0S
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\LpzuKsYuAh\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\LpzuKsYuAh" 1kdmapperwithdriver.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2140 1kdmapperwithdriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2140 1kdmapperwithdriver.exe