Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 21:28

General

  • Target

    Spoof Instructions/Toolz/PrivaZerPortable/App/PrivaZer/PrivaZer.exe

  • Size

    23.7MB

  • MD5

    04862d6db6cf3fe0fbc8aefb3f711952

  • SHA1

    ac9442e75bd6ac39456f9114d62752694497cf44

  • SHA256

    062629714716129610709d15bb2a8fac436ccf28b2eb3e67c754b1ef0a1d92d8

  • SHA512

    28cf9f58ec69d227110c803dd3ad6528efcf837cb1ae664e2c39c11052e4998b1af272045e38d14207b9314d0a6de889877c713924f40b274ba46092b351398c

  • SSDEEP

    393216:5X0sRxCa14ApBLHWIWhkvEcrfp7uSIWssp35QVGgYGHcMenumG1RIYKj1SN8Ojxi:SuCmLHRdIWsBGA8imG1RIYKj1SN8Ojxi

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\App\PrivaZer\PrivaZer.exe
    "C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\App\PrivaZer\PrivaZer.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2400
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1484
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 516
      2⤵
      • Modifies data under HKEY_USERS
      PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

    Filesize

    1024KB

    MD5

    914ccd5abf3969f3b7a886c57cec5202

    SHA1

    db8e5f8c1f038a8f3401b49d2ea394f3995ec18d

    SHA256

    1125a4e1266c297122c7341938776ad9a5bbf782e2dfd2db7589787fcda31d30

    SHA512

    0207b8db600c0eb47b46f663f9eeb09db5c71fab34e5221b4611413a7a19629821986da37c2ff5cb06997c09df220be59cec4d0e1cdaf567f082c89782056a77

  • C:\Users\Admin\AppData\Local\Temp\000\PrivaZer.default.ini

    Filesize

    28KB

    MD5

    41307bb0634da41c6f7a3af2e2bda5dd

    SHA1

    34e3aa27f85502009da8a21955d9060873986128

    SHA256

    7094fb1eb7fb766c2667d25ab86e61181df44d621f6a633ae0c74aeacfa3285d

    SHA512

    4d63db1505a165c605be6e6320926c1afc9c3ef5a0b0d3f4f7b25f33d49a095f8f003c86a545c0c22ea4a89016da89043e3ed4a7abffb285866d8e212e41c9e1

  • C:\Users\Admin\AppData\Local\Temp\000\data.ini

    Filesize

    140B

    MD5

    3609ef20d16ad5c78e0469ca2bad3f0b

    SHA1

    deca2f556b642ce7bb809704c9b061875af458af

    SHA256

    36dd46ff5a34555ff8225e07e0df3fc59cbfa07c069155e483f071dc5398b6ef

    SHA512

    500d8255c2a3133f671738b76171be7a14e8501514c9b372c2b30dd48dd89a11b7d313797b9c9c2aef51a7dee3e4ab35a607c0ac15485612c0733cd3811b776e

  • C:\Users\Admin\AppData\Local\Temp\000\data.ini

    Filesize

    33B

    MD5

    b2ec006c3e67b6bd9129fe5e5fbe7b27

    SHA1

    43ad64edcb9e6cb1f2aa597ce5ff44d1b2e178c4

    SHA256

    2d7bcda4007dc91377a9856cde2afc8dde9431514c46317f9235d2847e9249ab

    SHA512

    62e8776de89c07f99911f4de5d4b17cf1342d45693311e49d62195bb01b1d1b2731a0c0fc7f50caa9e5379d013d286292eb54e46d0a00a6b1bc16d828d60edc0

  • memory/2400-171-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2400-150-0x0000000000400000-0x0000000001BE7000-memory.dmp

    Filesize

    23.9MB

  • memory/2400-0-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2788-131-0x0000000003220000-0x0000000003228000-memory.dmp

    Filesize

    32KB

  • memory/2788-151-0x0000000003C80000-0x0000000003C88000-memory.dmp

    Filesize

    32KB

  • memory/2788-69-0x0000000001270000-0x0000000001271000-memory.dmp

    Filesize

    4KB

  • memory/2788-78-0x0000000001390000-0x0000000001398000-memory.dmp

    Filesize

    32KB

  • memory/2788-61-0x0000000001340000-0x0000000001341000-memory.dmp

    Filesize

    4KB

  • memory/2788-60-0x0000000001380000-0x0000000001388000-memory.dmp

    Filesize

    32KB

  • memory/2788-139-0x00000000036E0000-0x00000000036E1000-memory.dmp

    Filesize

    4KB

  • memory/2788-145-0x00000000036E0000-0x00000000036E8000-memory.dmp

    Filesize

    32KB

  • memory/2788-34-0x0000000001C90000-0x0000000001CA0000-memory.dmp

    Filesize

    64KB

  • memory/2788-67-0x0000000001340000-0x0000000001348000-memory.dmp

    Filesize

    32KB

  • memory/2788-152-0x0000000003C70000-0x0000000003C71000-memory.dmp

    Filesize

    4KB

  • memory/2788-155-0x0000000003C80000-0x0000000003C81000-memory.dmp

    Filesize

    4KB

  • memory/2788-162-0x0000000003C80000-0x0000000003C88000-memory.dmp

    Filesize

    32KB

  • memory/2788-168-0x0000000003D90000-0x0000000003D91000-memory.dmp

    Filesize

    4KB

  • memory/2788-18-0x0000000001B90000-0x0000000001BA0000-memory.dmp

    Filesize

    64KB

  • memory/2788-176-0x0000000004DE0000-0x0000000004DE8000-memory.dmp

    Filesize

    32KB

  • memory/2788-213-0x0000000003370000-0x0000000003378000-memory.dmp

    Filesize

    32KB

  • memory/2788-214-0x0000000003340000-0x0000000003341000-memory.dmp

    Filesize

    4KB