Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 21:23
Behavioral task
behavioral1
Sample
builder.exe
Resource
win10v2004-20240802-en
General
-
Target
builder.exe
-
Size
470KB
-
MD5
8c689dc9e82c9356b990d2b67b4943e1
-
SHA1
6bdc415b9c356bbeaea75c7336cd72910b95a644
-
SHA256
e8e2deb0a83aebb1e2cc14846bc71715343372103f279d2d1622e383fb26d6ef
-
SHA512
fb38a79dbcebde149736d5e1ca37dc15d274838be304d3f86e992d610b50c31d7fe4c30f6697c890f3753443af16eab712aef3f8da88d76ed00790083deb51e4
-
SSDEEP
12288:7tDkI5O/1MHOvEIfRfaXNCTL98vy7anEvY86vM1kiY4XotXpEKAoiO5wBmrkAUfM:7tQcOdu4BcCTL98vy7anEvY86vM1kiYt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2452 taskmgr.exe Token: SeSystemProfilePrivilege 2452 taskmgr.exe Token: SeCreateGlobalPrivilege 2452 taskmgr.exe Token: 33 2452 taskmgr.exe Token: SeIncBasePriorityPrivilege 2452 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe 2452 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\builder.exe"C:\Users\Admin\AppData\Local\Temp\builder.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3552
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2452