Analysis
-
max time kernel
92s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-08-2024 09:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
contract Agreement.exe
Resource
win11-20240802-en
windows11-21h2-x64
6 signatures
300 seconds
General
-
Target
contract Agreement.exe
-
Size
2.1MB
-
MD5
947d5d54bcb0bb3401571e68125c05d1
-
SHA1
85b930cbf4d7a86ec4887915e1bec9912039c63b
-
SHA256
374170efee6359fe5776db7b9d8cfea1cbb92478b110bd851852102130147ca3
-
SHA512
de280efa3b7f309784f6c18de9e5339e96811781d71589c2763ec687cdb8063148e36eb2af5e32899ad804869d8376f0628a00ae1cce7d566667da171ed93eea
-
SSDEEP
49152:U5Dg3sJDRZo8DYpK/2sFq6r5o9quvlCZT1PXJWpFcLB8c4j:3s46LBmj
Score
7/10
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3688 set thread context of 5116 3688 contract Agreement.exe 87 -
Runs regedit.exe 1 IoCs
pid Process 2268 regedit.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe 5116 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3688 contract Agreement.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4640 3688 contract Agreement.exe 82 PID 3688 wrote to memory of 4640 3688 contract Agreement.exe 82 PID 3688 wrote to memory of 4640 3688 contract Agreement.exe 82 PID 3688 wrote to memory of 4640 3688 contract Agreement.exe 82 PID 3688 wrote to memory of 1092 3688 contract Agreement.exe 84 PID 3688 wrote to memory of 1092 3688 contract Agreement.exe 84 PID 3688 wrote to memory of 1092 3688 contract Agreement.exe 84 PID 3688 wrote to memory of 1092 3688 contract Agreement.exe 84 PID 3688 wrote to memory of 2268 3688 contract Agreement.exe 85 PID 3688 wrote to memory of 2268 3688 contract Agreement.exe 85 PID 3688 wrote to memory of 2268 3688 contract Agreement.exe 85 PID 3688 wrote to memory of 2268 3688 contract Agreement.exe 85 PID 3688 wrote to memory of 5116 3688 contract Agreement.exe 87 PID 3688 wrote to memory of 5116 3688 contract Agreement.exe 87 PID 3688 wrote to memory of 5116 3688 contract Agreement.exe 87 PID 3688 wrote to memory of 5116 3688 contract Agreement.exe 87 PID 3688 wrote to memory of 5116 3688 contract Agreement.exe 87 PID 3688 wrote to memory of 5116 3688 contract Agreement.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\contract Agreement.exe"C:\Users\Admin\AppData\Local\Temp\contract Agreement.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe"2⤵PID:4640
-
-
C:\Windows\System32\svchost.exe"C:\Windows\System32\svchost.exe"2⤵PID:1092
-
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"2⤵
- Runs regedit.exe
PID:2268
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-