Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    08-11-2024 15:08

General

  • Target

    tox tweaking/niggers/DevManView.exe

  • Size

    163KB

  • MD5

    d22ceb6b43f721fe4e892fea6c8990e6

  • SHA1

    3ad25b431280a0056579aeaacdf687bd8c3aa901

  • SHA256

    9abdc7cdc19548ada451aee6caabe296957c050062991892e7d9787ff6e0bdef

  • SHA512

    8c37d941c108172340697887529f3fdc430cdee31d1ff7501d4da7fa21183e8f02832651a99daa30908820b935798ae85e046374e70c1ea4802763edbe47ebc1

  • SSDEEP

    3072:d4xZZydQqxFMqeq48iiXvK1YY8IkTLuX1VBJsHSnSa7J:Ajrqy8iovKmdulVlt

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tox tweaking\niggers\DevManView.exe
    "C:\Users\Admin\AppData\Local\Temp\tox tweaking\niggers\DevManView.exe"
    1⤵
    • Enumerates connected drives
    • Maps connected drives based on registry
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads