Analysis

  • max time kernel
    31s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 20:35

General

  • Target

    thread_namecaller_NtQueueApcThreadEx2.exe

  • Size

    303KB

  • MD5

    35a74c6ce234dde531459cd2df6da412

  • SHA1

    02a3aa240281b1d83e56a32156806450485f736b

  • SHA256

    e43d53eba5a14013411643ef34e2a8c21dc4c4645fdb40d7b1751c46d9d2d472

  • SHA512

    0c1b0895927b780d6c046be23a2d4c973cf73abaa9e0d1e7382d3ce93a59ad7b0e92949765985e3f7312ddaf69d153c02c57da44f805cca32dc4b98df3e9b3a2

  • SSDEEP

    6144:bcolzBLCV/rZDiGdvApd9w3KEYtzFmodsTln:XzVCV/kAYpd90KSoq

Score
5/10

Malware Config

Signatures

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\thread_namecaller_NtQueueApcThreadEx2.exe
    "C:\Users\Admin\AppData\Local\Temp\thread_namecaller_NtQueueApcThreadEx2.exe"
    1⤵
      PID:3288
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4136
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\system32\mspaint.exe
          mspaint
          2⤵
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4256
        • C:\Windows\system32\tasklist.exe
          tasklist
          2⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4540
        • C:\Windows\system32\findstr.exe
          findstr /i mspaint
          2⤵
            PID:2144
          • C:\Users\Admin\AppData\Local\Temp\thread_namecaller_NtQueueApcThreadEx2.exe
            thread_namecaller_NtQueueApcThreadEx2.exe 4256
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1060
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
          1⤵
            PID:4812

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads