Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 21:28

General

  • Target

    Spoof Instructions/Toolz/PrivaZerPortable/App/PrivaZer/PrivaZer.exe

  • Size

    23.7MB

  • MD5

    04862d6db6cf3fe0fbc8aefb3f711952

  • SHA1

    ac9442e75bd6ac39456f9114d62752694497cf44

  • SHA256

    062629714716129610709d15bb2a8fac436ccf28b2eb3e67c754b1ef0a1d92d8

  • SHA512

    28cf9f58ec69d227110c803dd3ad6528efcf837cb1ae664e2c39c11052e4998b1af272045e38d14207b9314d0a6de889877c713924f40b274ba46092b351398c

  • SSDEEP

    393216:5X0sRxCa14ApBLHWIWhkvEcrfp7uSIWssp35QVGgYGHcMenumG1RIYKj1SN8Ojxi:SuCmLHRdIWsBGA8imG1RIYKj1SN8Ojxi

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\App\PrivaZer\PrivaZer.exe
    "C:\Users\Admin\AppData\Local\Temp\Spoof Instructions\Toolz\PrivaZerPortable\App\PrivaZer\PrivaZer.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4440
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Modifies data under HKEY_USERS
      PID:3792
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 788
      2⤵
      • Modifies data under HKEY_USERS
      PID:4912
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:2500
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost
    1⤵
      PID:3912
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost
      1⤵
        PID:1860

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\000\PrivaZer.default.ini

        Filesize

        28KB

        MD5

        7d3bf243fbd93d4bbee822f666a03283

        SHA1

        0abab040ef205d84179ac025dca355b595294009

        SHA256

        98174317a9bfa3f2a16291213cb74f6af25ae71c38cd335f097f665349f0dc5c

        SHA512

        ca50cea971f94027aa66c508a7afd87bf8aa62a96d765c654b64085f7075444b51fca6d88afcc7aaf573c4b2533b15c80a26ece5f0e186a9c7480ee0f433ba04

      • C:\Users\Admin\AppData\Local\Temp\000\data.ini

        Filesize

        33B

        MD5

        b2ec006c3e67b6bd9129fe5e5fbe7b27

        SHA1

        43ad64edcb9e6cb1f2aa597ce5ff44d1b2e178c4

        SHA256

        2d7bcda4007dc91377a9856cde2afc8dde9431514c46317f9235d2847e9249ab

        SHA512

        62e8776de89c07f99911f4de5d4b17cf1342d45693311e49d62195bb01b1d1b2731a0c0fc7f50caa9e5379d013d286292eb54e46d0a00a6b1bc16d828d60edc0

      • C:\Users\Admin\AppData\Local\Temp\000\data.ini

        Filesize

        140B

        MD5

        59ede453124c59bcee6621a1e32f6675

        SHA1

        a877e832dec181d862c49d86ced904c2e08260ad

        SHA256

        a387dee4526fe17f5127ad8c5c4c866f2b8ed93f45e084c03d3f50ce13e24936

        SHA512

        cac982e7648fef6ff78021a0a113e2ea5571ddb4f8cf08f26873d0a61d859adb213e9bfc5347df67b73348b750051e92caf864e144e1ce6bb839fb5e0af7d58c

      • memory/1344-39-0x00000218E13B0000-0x00000218E13C0000-memory.dmp

        Filesize

        64KB

      • memory/1344-23-0x00000218E12B0000-0x00000218E12C0000-memory.dmp

        Filesize

        64KB

      • memory/1344-121-0x00000218E7A90000-0x00000218E7A98000-memory.dmp

        Filesize

        32KB

      • memory/1344-55-0x00000218E58A0000-0x00000218E58A8000-memory.dmp

        Filesize

        32KB

      • memory/2500-157-0x000001CE8CF70000-0x000001CE8CF71000-memory.dmp

        Filesize

        4KB

      • memory/2500-155-0x000001CE8D470000-0x000001CE8D471000-memory.dmp

        Filesize

        4KB

      • memory/2500-158-0x000001CE8CF60000-0x000001CE8CF61000-memory.dmp

        Filesize

        4KB

      • memory/2500-160-0x000001CE8CF60000-0x000001CE8CF61000-memory.dmp

        Filesize

        4KB

      • memory/2500-163-0x000001CE8CEB0000-0x000001CE8CEB1000-memory.dmp

        Filesize

        4KB

      • memory/2500-116-0x000001CE8CF60000-0x000001CE8CF61000-memory.dmp

        Filesize

        4KB

      • memory/2500-154-0x000001CE8D480000-0x000001CE8D481000-memory.dmp

        Filesize

        4KB

      • memory/4440-8-0x0000000000400000-0x0000000001BE7000-memory.dmp

        Filesize

        23.9MB

      • memory/4440-123-0x0000000000400000-0x0000000001BE7000-memory.dmp

        Filesize

        23.9MB

      • memory/4440-124-0x0000000003AB0000-0x0000000003AB1000-memory.dmp

        Filesize

        4KB

      • memory/4440-118-0x0000000000400000-0x0000000001BE7000-memory.dmp

        Filesize

        23.9MB

      • memory/4440-0-0x0000000003AB0000-0x0000000003AB1000-memory.dmp

        Filesize

        4KB

      • memory/4440-7-0x0000000000400000-0x0000000001BE7000-memory.dmp

        Filesize

        23.9MB

      • memory/4440-6-0x0000000000400000-0x0000000001BE7000-memory.dmp

        Filesize

        23.9MB

      • memory/4440-5-0x0000000000400000-0x0000000001BE7000-memory.dmp

        Filesize

        23.9MB

      • memory/4440-1-0x000000000040B000-0x000000000040C000-memory.dmp

        Filesize

        4KB