Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 20:07
Behavioral task
behavioral1
Sample
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe
Resource
win10v2004-20240802-en
General
-
Target
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe
-
Size
9.9MB
-
MD5
551277f476f83179af0e58207008b8e0
-
SHA1
3c434f5f508bcb867f2b34f3b488849d267272c3
-
SHA256
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dc
-
SHA512
da67b5947a87f55142ed77ac7a4573d3d6d19a1b8451b167d0d787e432aff75ae117bb68448695aea88c3d57545af80389e52d0f7dabd4588863b943da3aa4bc
-
SSDEEP
98304:63wN6zR7vjAPjPbSnhLgJpQRpuVyJ1EanBv/ZmKq0bT:0RV7vjAPjMleQRpuAJGoLbT
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exedescription pid process Token: SeDebugPrivilege 3920 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exedescription pid process target process PID 3920 wrote to memory of 3952 3920 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe attrib.exe PID 3920 wrote to memory of 3952 3920 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe"C:\Users\Admin\AppData\Local\Temp\9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe2⤵
- Views/modifies file attributes
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4360,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=944 /prefetch:81⤵PID:5260