Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
VANGUARD BYPASS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VANGUARD BYPASS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
slayts.1337
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
slayts.1337
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
test.txt
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
test.txt
Resource
win10v2004-20240802-en
General
-
Target
slayts.1337
-
Size
1KB
-
MD5
2484c6ffccd87cad1274eca1e0b2ad55
-
SHA1
f83107a0df66ea20706f8a06f1b665025983fca7
-
SHA256
d02430778786d7999b8a91f3071857b3eb3c0f73adfa1dbc024f4a78e59ab37c
-
SHA512
1816eed9d4eebd1393ad2622337eaaadc4ab784a963557e61a6de95dae4eead97797a10899f5a717450092eaea36a936cf5b24712517622b058810bdc0e78316
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2676 1788 cmd.exe 31 PID 1788 wrote to memory of 2676 1788 cmd.exe 31 PID 1788 wrote to memory of 2676 1788 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\slayts.13371⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\slayts.13372⤵
- Modifies registry class
PID:2676
-