Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 11:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Axiom Free Temp.exe
Resource
win10-20240404-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Axiom Free Temp.exe
Resource
win10v2004-20240802-en
5 signatures
150 seconds
General
-
Target
Axiom Free Temp.exe
-
Size
168KB
-
MD5
461a1663734d622fc49e4a03b17d284d
-
SHA1
52505039993d7c19cc28debbaef474f5ab61c745
-
SHA256
f55ff667003f1cb9794a487a925a6c86e9043fda46ec2ab30f8926fd5f509f59
-
SHA512
b3c95a238ba90e72658cf2d0844f8d00dff13715110090d41031a15d0c35b082e857f5fdbc7c30deeda1164764f68bfa02fa4b89d522406c4b11b9dccca8b94d
-
SSDEEP
3072:Lhnks0n7phfmxymej1ic0UmJTQSaMm5/6aoP1D:1tU/mxyhjGvWljoP1D
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FxMBnYFjweJhdWs\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\FxMBnYFjweJhdWs" Axiom Free Temp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2816 Axiom Free Temp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2816 Axiom Free Temp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 Axiom Free Temp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3536 2816 Axiom Free Temp.exe 87 PID 2816 wrote to memory of 3536 2816 Axiom Free Temp.exe 87 PID 2816 wrote to memory of 1752 2816 Axiom Free Temp.exe 88 PID 2816 wrote to memory of 1752 2816 Axiom Free Temp.exe 88 PID 2816 wrote to memory of 3632 2816 Axiom Free Temp.exe 100 PID 2816 wrote to memory of 3632 2816 Axiom Free Temp.exe 100 PID 2816 wrote to memory of 4588 2816 Axiom Free Temp.exe 101 PID 2816 wrote to memory of 4588 2816 Axiom Free Temp.exe 101 PID 2816 wrote to memory of 384 2816 Axiom Free Temp.exe 102 PID 2816 wrote to memory of 384 2816 Axiom Free Temp.exe 102 PID 2816 wrote to memory of 4868 2816 Axiom Free Temp.exe 104 PID 2816 wrote to memory of 4868 2816 Axiom Free Temp.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 52⤵PID:3536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause >nul2⤵PID:4868
-