Analysis
-
max time kernel
99s -
max time network
82s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-07-2024 22:12
Behavioral task
behavioral1
Sample
ArabicHacker.exe
Resource
win10-20240404-en
windows10-1703-x64
4 signatures
300 seconds
General
-
Target
ArabicHacker.exe
-
Size
995KB
-
MD5
5a6445ecf47a7989c42a7067911fab47
-
SHA1
b94000887d703ad9155314a7d05529c5fc5d80f8
-
SHA256
b6f33edd6b32c6b979028742c74955b695f8cd6207f5401f0b22da4b16e62ebd
-
SHA512
9f9698ccd85a2d0ca2d3e0e9ed495bcb246591d4ce58ff4b2afdb5a9d6c978043d870523d69a0060b4de392c36a09ee3e134827ef0f176b4102e89248daf6e91
-
SSDEEP
24576:8PVjY/bEwH9O8TghUzrdPodIzl4sdPFNXdP4M2drmk:cV+bROMghUzJBrJj2b
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3924-0-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral1/memory/3924-3-0x0000000000400000-0x0000000000586000-memory.dmp upx behavioral1/memory/3924-4-0x0000000000400000-0x0000000000586000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: ArabicHacker.exe File opened (read-only) \??\B: ArabicHacker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2444 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2444 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3924 ArabicHacker.exe 3924 ArabicHacker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArabicHacker.exe"C:\Users\Admin\AppData\Local\Temp\ArabicHacker.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:3924
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2001⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1056