Resubmissions

27/07/2024, 17:08

240727-vnrrpszapr 10

24/07/2024, 13:55

240724-q8e67aygrr 10

Analysis

  • max time kernel
    18s
  • max time network
    24s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 17:08

General

  • Target

    c1be767404a3d71717a54b01ebfa91ebff578dad8dd518a1a49012bcf012738e.zip

  • Size

    18.4MB

  • MD5

    f4668d061e909155b6fac133b996454f

  • SHA1

    f447f9f60c302e86396d0c6ee87a9d051ffdc663

  • SHA256

    c1be767404a3d71717a54b01ebfa91ebff578dad8dd518a1a49012bcf012738e

  • SHA512

    37b060d37792f1c6579e3f06a7f511048bbd03f683f42cfcb97974e606f83104f0415b391a2fcaedb8b27b8c5aca81392ff37790056e1b28242f244392626898

  • SSDEEP

    393216:ajbiEohoCmIKjjw8t2Ilk1TZj4ASPRlZzXFAuU2ywpV:aqEfSKj/t2IqTN4xRlzAMyYV

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\c1be767404a3d71717a54b01ebfa91ebff578dad8dd518a1a49012bcf012738e.zip
    1⤵
      PID:1752
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1476-0-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-2-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-1-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-12-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-11-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-10-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-9-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-8-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-7-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB

    • memory/1476-6-0x000002B92B6B0000-0x000002B92B6B1000-memory.dmp

      Filesize

      4KB