Analysis
-
max time kernel
32s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 11:27
Behavioral task
behavioral1
Sample
TROLLLOLL-main.zip
Resource
win10v2004-20240704-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
TROLLLOLL-main.zip
-
Size
78.7MB
-
MD5
71e713dd3adb5162493877d698767493
-
SHA1
75c04f6ad957c7a5057963339476408ea8e507db
-
SHA256
6b55434b24ebda6659479358d5d66ae7ee02552656234a36fcd2a7c7c4b852c9
-
SHA512
2b67cbea20eca6714390c4cd34a2452a726b41eacda0cc9729224cbc6ec6169fdda2c6857be386f620ffb1bf50e3f31e21f26eda2ef5fa2e8e8996590a5c7b4e
-
SSDEEP
1572864:viu5xhyD0sNAD5YIE7HhN9n0NeTBXbt6hID3dYdjacB2RVgZ06Kmj7uqi0e:vnV4ANYIk3x3lXJ6o+d2c8b+0dmPje
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2300 taskmgr.exe Token: SeSystemProfilePrivilege 2300 taskmgr.exe Token: SeCreateGlobalPrivilege 2300 taskmgr.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe 2300 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\TROLLLOLL-main.zip1⤵PID:3116
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2988
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2300