Resubmissions
03-07-2024 17:12
240703-vq9qas1fle 10Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 17:12
Behavioral task
behavioral1
Sample
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.zip
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.elf
Resource
ubuntu2204-amd64-20240611-en
General
-
Target
09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.zip
-
Size
1.1MB
-
MD5
a805009756c29d18619a8ff80bd96b4e
-
SHA1
eeb1d705c1089746251559dbc2d49f86f65518d0
-
SHA256
37b302ee4b6db0c02196275ecbcdca4db3ecffbecafd43239b3c6df279864d95
-
SHA512
1bf3d54e5f3cc5dd5d5685be4a78c4e568e5ff70181d6e4fb4e05534e036dc92bc3aaf5d238efdf579205fe74e3233373a57932678eb41d8128b7fadbe1c9b97
-
SSDEEP
24576:PQiJTovxd3JQGkvcPQAX4ZMQNtKw7K3M0PV+TtkiLkmKaZUPPXuXCI/3GdtsdBEf:PQiAJQAPQ6I30PYTWbU6PP527s
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
taskmgr.exepid process 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 3960 taskmgr.exe Token: SeSystemProfilePrivilege 3960 taskmgr.exe Token: SeCreateGlobalPrivilege 3960 taskmgr.exe Token: SeSecurityPrivilege 3960 taskmgr.exe Token: SeTakeOwnershipPrivilege 3960 taskmgr.exe Token: 33 3960 taskmgr.exe Token: SeIncBasePriorityPrivilege 3960 taskmgr.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
Processes:
taskmgr.exepid process 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe -
Suspicious use of SendNotifyMessage 46 IoCs
Processes:
taskmgr.exepid process 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe 3960 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\09a79e5e20fa4f5aae610c8ce3fe954029a91972b56c6576035ff7e0ec4c1d14.zip1⤵PID:1568
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3700
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3960