Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 13:33
Behavioral task
behavioral1
Sample
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe
Resource
win10v2004-20240802-en
General
-
Target
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe
-
Size
9.9MB
-
MD5
551277f476f83179af0e58207008b8e0
-
SHA1
3c434f5f508bcb867f2b34f3b488849d267272c3
-
SHA256
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dc
-
SHA512
da67b5947a87f55142ed77ac7a4573d3d6d19a1b8451b167d0d787e432aff75ae117bb68448695aea88c3d57545af80389e52d0f7dabd4588863b943da3aa4bc
-
SSDEEP
98304:63wN6zR7vjAPjPbSnhLgJpQRpuVyJ1EanBv/ZmKq0bT:0RV7vjAPjMleQRpuAJGoLbT
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exedescription pid process Token: SeDebugPrivilege 2552 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exedescription pid process target process PID 2552 wrote to memory of 2452 2552 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe attrib.exe PID 2552 wrote to memory of 2452 2552 9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe"C:\Users\Admin\AppData\Local\Temp\9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\9084d381123e0c42045a8c6084dae52d83794552487f1b201b91fe97a49a65dcN.exe2⤵
- Views/modifies file attributes
PID:2452
-