Analysis
-
max time kernel
17s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 15:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
emojicc.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
1800 seconds
General
-
Target
emojicc.exe
-
Size
11.7MB
-
MD5
539d9ef2ab16227cdf067c4002f68f2d
-
SHA1
a53da3d2ea21b22767557c0495900ea77108bf39
-
SHA256
9294414fac01cd99bc54bcd9731922c296900224b7cc376a93471603c94462f6
-
SHA512
c12df005a031dedec34854934153d53aeaf3708ffb22c90353d77d8fec10e393fc9fde03b9295383a3ef20b40a7a26a293531d42dbce7b34c2f7416f4bf78e37
-
SSDEEP
196608:h+Tsrs3Fk7n5njuR2PQy769LV0i2OANIv85DSbsvCIBGZFereYXdi8TvFj9bzM6:Osr4Fk75jc+QZ0i2OAIXsvtsLY08TvFr
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1144 taskmgr.exe Token: SeSystemProfilePrivilege 1144 taskmgr.exe Token: SeCreateGlobalPrivilege 1144 taskmgr.exe Token: 33 1144 taskmgr.exe Token: SeIncBasePriorityPrivilege 1144 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe 1144 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\emojicc.exe"C:\Users\Admin\AppData\Local\Temp\emojicc.exe"1⤵PID:372
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1144