Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 16:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
silence-workspace.exe
Resource
win7-20240729-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
silence-workspace.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
silence-workspace.exe
-
Size
1.6MB
-
MD5
97d8c6ad9269c4c236189f67239e5ad7
-
SHA1
80ad383e774a8f6b528ae0bc64ea2a4bdeade14f
-
SHA256
2048c60fe0ac7826ce42ee5717a82632347659fba3a0dec1f4f00230fcd24a26
-
SHA512
0010c74afabe0180d70f50fb3f89739b798aaf6c8f9cc70655f7ef735cd19d14462a60c992a89880838910106ffd1034f3bb3d97abe55f8ae189f88e84b0abff
-
SSDEEP
24576:Ft7JH2OYG2PUEw6h2lZozPHurhEwgj5U8pf7bSrnyVUn/7oUVcnl0jjx6CAK5:37xTt2PLwcsoLOrKwgSS6WUnzoUenl0
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2580 taskmgr.exe Token: SeSystemProfilePrivilege 2580 taskmgr.exe Token: SeCreateGlobalPrivilege 2580 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe 2580 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\silence-workspace.exe"C:\Users\Admin\AppData\Local\Temp\silence-workspace.exe"1⤵PID:2296
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2580
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4216