Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
Kernel.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Kernel.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Load Driver [ADMIN].bat
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Load Driver [ADMIN].bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Mapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Mapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Valorant.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Valorant.exe
Resource
win10v2004-20240802-en
General
-
Target
Load Driver [ADMIN].bat
-
Size
38B
-
MD5
b56b9ab3209f7b0958976644f03776f8
-
SHA1
054c58ab6b517710776fa6ed8e20aabaf37d360f
-
SHA256
419124eb528c4c9ddb1e3713b72be124437f5632cf0ad1cbdc5b81c52407c401
-
SHA512
bf2515e032f3dd8885b4e8aead91dce3d46199d3dad242b8fee980b33a99def11def0f64936da7f3d456d4d376f0c3df68a4dca04b50f9cd314e99441a3d9f77
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\xyqOBLrMNqVnFnMzFNNOGrcI\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\xyqOBLrMNqVnFnMzFNNOGrcI" Mapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2092 Mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2092 Mapper.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2092 2692 cmd.exe 31 PID 2692 wrote to memory of 2092 2692 cmd.exe 31 PID 2692 wrote to memory of 2092 2692 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Load Driver [ADMIN].bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Mapper.exeMapper.exe Kernel.sys2⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2092
-