Analysis

  • max time kernel
    30s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 03:52

General

  • Target

    x64d/release/x64/renamed.exe

  • Size

    182KB

  • MD5

    1b03af12adea3adeec805c5a017fae4f

  • SHA1

    1961397a4818222fccc1ffd5fb3bb1a4e83feaf2

  • SHA256

    89e426ecb39a22bea0af72dc6270b61d49bfac357b6db1af0de50b0ce28a51f8

  • SHA512

    fd358d793ac38ef37123c234c7f1018a952e2b6240ad2a5372ae9942c1436a90ba67649da509a1cea9d8bf8ffcd8a9d8eafa0ac13760391ebfd9978da75217c9

  • SSDEEP

    3072:YtXM+UT/Jx91Vp0rjsL1Teob7P+tTiL41HGKVrWXdPN:EXYTL9jKrjsJioHPkhHPVrWt1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 58 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x64d\release\x64\renamed.exe
    "C:\Users\Admin\AppData\Local\Temp\x64d\release\x64\renamed.exe"
    1⤵
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\x64d\release\x64\plugins\scylla_hide.ini

    Filesize

    29KB

    MD5

    428f5c89c20bf4fe371149130a7bf260

    SHA1

    2ad3d120558dccfd07e4c90334d4ae1b51919ad5

    SHA256

    3ba7107913b7c9db6f4b3e2e98935f92e1c624b212963564f3156005d14915ba

    SHA512

    f3c8afd900347b1d2192474acaade81dc66654aa7171daeee602de762bf366cb23db4c208d31cf4abe3e7989c8d3db53360fe07bf1919b983c5d656ff2d62404

  • memory/3332-0-0x0000000060850000-0x0000000060D9A000-memory.dmp

    Filesize

    5.3MB

  • memory/3332-2-0x0000000061300000-0x0000000061315000-memory.dmp

    Filesize

    84KB