Analysis
-
max time kernel
23s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 22:58
General
-
Target
Sena.exe
-
Size
661KB
-
MD5
c4cbee0a201dbd8a73d4cbf3a2cda032
-
SHA1
1c47fb6372bf468386dc4296b7d4848653ac6586
-
SHA256
6692ae7b22a57bff5df25a90c397e5c1251f1749545bf194026e72dd991d371c
-
SHA512
ed4507ffbde0cc4fd47652b5b56d7caba761c7d759a0987c11f5cd080b84b233d0bdbfb250890c23a592e3932097e95158f06251b6ac9061608e7a9d130b545a
-
SSDEEP
12288:DLV6BtpmkZPhWK3toMN4gatGC3yLx8NKMH1eyJ2ar9aJUPjsYntSZ6:nApf7fItk1MVeyNr9+Kj7A
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NAS Host = "C:\\Program Files (x86)\\NAS Host\\nashost.exe" Sena.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Sena.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NAS Host\nashost.exe Sena.exe File opened for modification C:\Program Files (x86)\NAS Host\nashost.exe Sena.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2004 Sena.exe 2004 Sena.exe 2004 Sena.exe 2004 Sena.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2004 Sena.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2004 Sena.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sena.exe"C:\Users\Admin\AppData\Local\Temp\Sena.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2004