Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 08:29
Behavioral task
behavioral1
Sample
2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe
Resource
win7-20240611-en
5 signatures
150 seconds
General
-
Target
2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe
-
Size
14.9MB
-
MD5
4d6930e499aa495b8aa1d0a38d46bc23
-
SHA1
06f079863c17528ba708a9178ac6e2b7bde0391c
-
SHA256
2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac
-
SHA512
18c8e3f1fc6820e82d23cdfd6a92410f9c42dcc2033b7ec32aedf920c2831928b0f5325908f70bf6725d2870abb5e857e1e4669061471536134969072d4fc8b3
-
SSDEEP
393216:sEhVR32sOFUu0TQcay//TXEC13OxqPuDo7TJlm:sECqVTDaTClfPRA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1620-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-57-0x0000000003EC0000-0x0000000003EE6000-memory.dmp upx behavioral2/memory/1620-56-0x0000000003E90000-0x0000000003EB6000-memory.dmp upx behavioral2/memory/1620-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-54-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1620-12-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/1620-10-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-55-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-58-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-59-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-60-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-61-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-62-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-63-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-64-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-65-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-66-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-67-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-68-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-69-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-70-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-71-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-72-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-73-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-74-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-75-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-76-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-77-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-78-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect behavioral2/memory/1620-79-0x0000000000400000-0x0000000001D49000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe 1620 2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe"C:\Users\Admin\AppData\Local\Temp\2898fe0f0e64f784887a48c923baa9495fac4f95325c88e32c2c534f8c2afdac.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:4488