Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 14:59

General

  • Target

    howl cracked/build patch.exe

  • Size

    1.4MB

  • MD5

    12e377b3790dfe601181b1d20f47c3e3

  • SHA1

    ea56f83370eea618df26837524454bf8487c9976

  • SHA256

    86e0c4a3ad1c88d1bc22efa39311b80de428291d40f89a43cfc199a563b9be3f

  • SHA512

    f6f3deb097a751341937f1f944e74a84c3b96aca7892ade01e50da854fc5d5ad3727f4c1ea4dbf1c881ab9a7007f6fcd51c7a5d87fa11a965367371613ca3107

  • SSDEEP

    24576:wzJnIwl1Hsf2BZ9JnMKKQZiXDeOPaW4C30Wemex2ze+9SpPLn7J0:wNdsf2dJnMQ0mPe

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\howl cracked\build patch.exe
    "C:\Users\Admin\AppData\Local\Temp\howl cracked\build patch.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c color f
      2⤵
        PID:4808
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\howl cracked\build patch.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3388
        • C:\Windows\system32\certutil.exe
          certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\howl cracked\build patch.exe" MD5
          3⤵
            PID:4072
          • C:\Windows\system32\find.exe
            find /i /v "md5"
            3⤵
              PID:4428
            • C:\Windows\system32\find.exe
              find /i /v "certutil"
              3⤵
                PID:1284
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /4
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4932

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4932-3-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-4-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-5-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-15-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-14-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-13-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-12-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-11-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-10-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB

          • memory/4932-9-0x000001DDC0310000-0x000001DDC0311000-memory.dmp

            Filesize

            4KB