Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 21:49
Behavioral task
behavioral1
Sample
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe
Resource
win10v2004-20240802-en
General
-
Target
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe
-
Size
9.9MB
-
MD5
0c3c4a869155af9e9972a46df8e13861
-
SHA1
03cf1c9881496a5286fafba31c1e6f99805d8ea3
-
SHA256
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302
-
SHA512
1b0b951b6074d3aa72ae0449fc0e2beb48dc16664ba950c1d2c97c25562c79ef2124af78201c4d5322bdace40c2efd339f979d02dcf3dbbd8cfd521c9b3fec71
-
SSDEEP
98304:mZ9GQPTvuGWZF3FLufcKlLXlqR6UBim/rEEnBv/Zm2qCbk:mKQ7mGWZF3R5MBqR6UN/4W1bk
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exedescription pid process Token: SeDebugPrivilege 2032 593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exedescription pid process target process PID 2032 wrote to memory of 220 2032 593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe attrib.exe PID 2032 wrote to memory of 220 2032 593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe"C:\Users\Admin\AppData\Local\Temp\593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\593a7fa7ce0a6fc7c5cd10e99b2108cfc0f7b62dfdb74fddfb0210da0400f302.exe2⤵
- Views/modifies file attributes
PID:220
-