Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 23:59

General

  • Target

    bin/antimicrox.exe

  • Size

    4.4MB

  • MD5

    74fb30272498eb73ef8376a973aef75b

  • SHA1

    8809cb445f2b9c7fb79a6afe35c112c67a6d120c

  • SHA256

    4d4d616c9345591e6d4832891a3634e151680aa84199623e8d92d2597957d52c

  • SHA512

    90cd289c720cd034f023af53b3413dc0e37234e418389cd92d5d04a7e8510b24487b0f53dc6c0363c1465268dd537b2b3411ba69e4b6d715642096689a5fa403

  • SSDEEP

    49152:Fo8S/MBg4pajysjYMOXJO4cSq7UamWZeUaGJz2el6HeLZ/qVxlsw7A7nDYn9D:OBEf/TMxSM7jJzD6Q4n9D

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bin\antimicrox.exe
    "C:\Users\Admin\AppData\Local\Temp\bin\antimicrox.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4888-0-0x0000000000A70000-0x0000000001142000-memory.dmp
    Filesize

    6.8MB

  • memory/4888-2-0x000001E17CD60000-0x000001E17CD70000-memory.dmp
    Filesize

    64KB

  • memory/4888-1-0x0000000000A70000-0x0000000001142000-memory.dmp
    Filesize

    6.8MB

  • memory/4888-10-0x0000000069700000-0x00000000698B2000-memory.dmp
    Filesize

    1.7MB

  • memory/4888-9-0x00007FFE31200000-0x00007FFE31453000-memory.dmp
    Filesize

    2.3MB

  • memory/4888-8-0x00007FFE31460000-0x00007FFE316B2000-memory.dmp
    Filesize

    2.3MB

  • memory/4888-11-0x0000000061DC0000-0x0000000062345000-memory.dmp
    Filesize

    5.5MB

  • memory/4888-15-0x000001E17CD60000-0x000001E17CD70000-memory.dmp
    Filesize

    64KB

  • memory/4888-14-0x000000006A880000-0x000000006AA45000-memory.dmp
    Filesize

    1.8MB

  • memory/4888-13-0x0000000000A70000-0x0000000001142000-memory.dmp
    Filesize

    6.8MB

  • memory/4888-12-0x0000000068880000-0x0000000068EB9000-memory.dmp
    Filesize

    6.2MB

  • memory/4888-7-0x00007FFE352B0000-0x00007FFE352DC000-memory.dmp
    Filesize

    176KB

  • memory/4888-6-0x00007FFE39350000-0x00007FFE39366000-memory.dmp
    Filesize

    88KB

  • memory/4888-5-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB

  • memory/4888-16-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB

  • memory/4888-26-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB

  • memory/4888-43-0x0000000068880000-0x0000000068EB9000-memory.dmp
    Filesize

    6.2MB

  • memory/4888-44-0x0000000000A70000-0x0000000001142000-memory.dmp
    Filesize

    6.8MB

  • memory/4888-36-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB

  • memory/4888-46-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB

  • memory/4888-56-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB

  • memory/4888-63-0x0000000068880000-0x0000000068EB9000-memory.dmp
    Filesize

    6.2MB

  • memory/4888-64-0x0000000000A70000-0x0000000001142000-memory.dmp
    Filesize

    6.8MB

  • memory/4888-66-0x00007FF600200000-0x00007FF600561000-memory.dmp
    Filesize

    3.4MB