Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 12:23

General

  • Target

    ua.exe

  • Size

    5.6MB

  • MD5

    53138f8c713ad1fea892cec51658a1da

  • SHA1

    f2fa0977a7c3c250d573d10622ab8c0a40596c22

  • SHA256

    20fe23ed0cd5ace464a9201a8a71672d46dc3b6b4091bcd21d40c4ddd0c485d4

  • SHA512

    393f6fa52ab11c86dcf1ac266d047f493d442f160136098150701926720f700e396397d474b8bafdd3dccb8f5ad398f4ef560683c7eb55ca30cda11df6f92f2b

  • SSDEEP

    98304:3Ss5U0DKFCGvww8mJmcGT4Jt9ZfznrQsr77tlQ2sqt1O2:bq3CGYT4BZbnjr77PQMO2

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ua.exe
    "C:\Users\Admin\AppData\Local\Temp\ua.exe"
    1⤵
      PID:3640
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1896-2-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-4-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-3-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-14-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-13-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-12-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-11-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-10-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-9-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/1896-8-0x0000021CDA4F0000-0x0000021CDA4F1000-memory.dmp

      Filesize

      4KB

    • memory/3640-0-0x00007FF7035C0000-0x00007FF704396000-memory.dmp

      Filesize

      13.8MB

    • memory/3640-1-0x00007FF7035C0000-0x00007FF704396000-memory.dmp

      Filesize

      13.8MB