Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2024 09:04

General

  • Target

    Versium Research/VersiumResearch64bit.exe

  • Size

    252KB

  • MD5

    ee19bc8a2b6c6fd7c30037389457a4df

  • SHA1

    e1fca1cc33574e59dec62763ee6e7de1a5198095

  • SHA256

    76af8837a5ac0384faeeeff8c8987f796206fc4a1691428dbd44a14378ff28c0

  • SHA512

    38db6d4ca6f106849f2ba173e20dae0a53c3e558eb676adba380761cc0318769c6add3a2e816705c094596fc305dab1dd39eb2b83e9f3e066ffc90de580af001

  • SSDEEP

    3072:45uNO+8s6V5WQZV08YLmqa/Qh10UNtGOWmA3hLKKKKKU8AAFTbp8ELQHsoOJNuY2:45W8sscuVVYLOoh1MGfJXnIZRhv

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Versium Research\VersiumResearch64bit.exe
    "C:\Users\Admin\AppData\Local\Temp\Versium Research\VersiumResearch64bit.exe"
    1⤵
      PID:4340
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2852
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
      • Checks SCSI registry key(s)
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:1852
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      1⤵
        PID:384
      • C:\Windows\system32\sihost.exe
        sihost.exe
        1⤵
          PID:4988

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4340-4-0x00007FFFD3A30000-0x00007FFFD3C1B000-memory.dmp

          Filesize

          1.9MB