Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
Update.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Update.exe
Resource
win10v2004-20241007-en
General
-
Target
Update.exe
-
Size
1.5MB
-
MD5
d9aefa815c8389953a136125d4baaae6
-
SHA1
77cb094fb0229e9a3354457ed9b096d5dca11bb9
-
SHA256
65df86270cfcfdc5612a327a137d64a3e2e71a9109f21cc5ff9868108710ac2d
-
SHA512
07c8a47ff90ebff621e79354f054de627398c79ab410dc002cc385998994f789beb6c54c87a09651fe34aa70245e37af655b98e0b6b65530c6285dafb262a626
-
SSDEEP
12288:u6CyLEgR0ro/0EhcXAHjRYSN9bUlOr/oJfT9Pu0XejfQ1JRQ3Tzvx+nDIpnUk:3EgRN/th3VelBPu0XUfWJms0pnp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2052 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2052 taskmgr.exe Token: SeSystemProfilePrivilege 2052 taskmgr.exe Token: SeCreateGlobalPrivilege 2052 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe 2052 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"1⤵
- System Location Discovery: System Language Discovery
PID:968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4060
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e57a6e70b8ae6940ed761121e5f86bad
SHA1aa080336f2f6fd47ba55b7d9b5ff21ec27c665a2
SHA2563f9e9790ecc228887f345c8cc495b550487c345c2ddb63aa8d81f45d02741f44
SHA51216dc9d8b849f4a330e81fc8dfbfdc29823fb9fee7983bd9de7b936d14ccf94561b6697d67c237fc11d9720ad212b7c3b34b37921eb50fe315ee1b9678f058d9b
-
Filesize
67B
MD5908e836b9206db545e0c5fca6ac6e79b
SHA143260ab2f507c0fc8234767aef33d6168693e6c3
SHA256c398aa23e8aeca8242160d5e3f4f170da7e7f8b9198894fca27ede23d6fe61bd
SHA51225453194867386d5f00ee745d8d0ed37aa2cf8013f67297dea5811ad474889f67a322f2bf123f826a9e9c4cc92dd6f68f45b541695434ac5fb0c9aa43f481856