Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 01:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
artifact.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
artifact.exe
-
Size
5.8MB
-
MD5
b34832a7f3afd72e6c12bdf9d873c8da
-
SHA1
fbeca3d9eff1bcc51b01a9f8c4f6e9bbe9256f49
-
SHA256
cb107e6cc802da3127dd5c0cf2b5fc334284473e0d01499b829e821ff57a39e7
-
SHA512
6931ee8c8d04e66443311e2133b6a3186f78be794ca407beea93df2840168818517def2c8272cafcde33ba051b676af10a69be238c81aba8f1946bd3f92c0b31
-
SSDEEP
98304:vnqJy0HVvs0ncHmLrfXyDoxMxCjCMudoFyBb6bskVAjCVAGdmuL6yd+fTVBX:fMySxXckrmox3jCddoFyJ6btO2VAGvJC
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2112 artifact.exe 2112 artifact.exe 2112 artifact.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4220 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2112 artifact.exe 2112 artifact.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3344 2112 artifact.exe 89 PID 2112 wrote to memory of 3344 2112 artifact.exe 89 PID 3344 wrote to memory of 3152 3344 cmd.exe 90 PID 3344 wrote to memory of 3152 3344 cmd.exe 90 PID 3344 wrote to memory of 1992 3344 cmd.exe 91 PID 3344 wrote to memory of 1992 3344 cmd.exe 91 PID 3344 wrote to memory of 2464 3344 cmd.exe 92 PID 3344 wrote to memory of 2464 3344 cmd.exe 92 PID 2112 wrote to memory of 3032 2112 artifact.exe 93 PID 2112 wrote to memory of 3032 2112 artifact.exe 93 PID 3032 wrote to memory of 4232 3032 cmd.exe 94 PID 3032 wrote to memory of 4232 3032 cmd.exe 94 PID 4232 wrote to memory of 4220 4232 cmd.exe 98 PID 4232 wrote to memory of 4220 4232 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\artifact.exe"C:\Users\Admin\AppData\Local\Temp\artifact.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\artifact.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\artifact.exe" MD53⤵PID:3152
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1992
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:2464
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo You need to run the KeyAuthApp.init(); function before any other KeyAuth functions && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo You need to run the KeyAuthApp.init(); function before any other KeyAuth functions && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:4220
-
-
-