Overview
overview
10Static
static
3tmpfile-ma...r3.exe
windows11-21h2-x64
8tmpfile-ma...rm.exe
windows11-21h2-x64
10tmpfile-ma...ir.exe
windows11-21h2-x64
10tmpfile-ma...32.exe
windows11-21h2-x64
10tmpfile-ma...63.exe
windows11-21h2-x64
3tmpfile-ma...64.exe
windows11-21h2-x64
10tmpfile-ma...ox.exe
windows11-21h2-x64
7tmpfile-ma...7I.exe
windows11-21h2-x64
1tmpfile-ma...8I.exe
windows11-21h2-x64
7Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-11-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
tmpfile-main/0000000r00d000r3.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
tmpfile-main/Exterm.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
tmpfile-main/Gaming Chair.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
tmpfile-main/Node32.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
tmpfile-main/Node63.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
tmpfile-main/Node64.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
tmpfile-main/Sobfox.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
tmpfile-main/stTfuo7I.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
tmpfile-main/stTfuo8I.exe
Resource
win11-20241023-en
General
-
Target
tmpfile-main/0000000r00d000r3.exe
-
Size
4.9MB
-
MD5
340753116751ef6f5212667501a0e562
-
SHA1
ad4d25b43964c1c54accdcbe97a3f2ca80d15894
-
SHA256
b61907b9081bb5d7125264c5e60de013c02b7b866148248de603fb55f8d39a18
-
SHA512
d9564e38ea4000c16ebacc4a4b95925c8998d2bce33b3ad7bd0aa0b220d60f372d798591f4365b1271085036055519e4a94afd47d51ad5a2c6002e1f54ffc2f2
-
SSDEEP
98304:w4KoSKQ6Kob7IdoOPn49MWTB9z2OuVIsFx6fZPELW4sF+JKcNWdZRM9b7:wAXQFob7Idj/4VTbaVIsSBfFoxMnsb
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
0000000r00d000r3.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\OZXouncCpDUEwkdAxquHKsRR\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\OZXouncCpDUEwkdAxquHKsRR" 0000000r00d000r3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
0000000r00d000r3.exepid Process 3508 0000000r00d000r3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0000000r00d000r3.exepid Process 3508 0000000r00d000r3.exe 3508 0000000r00d000r3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
0000000r00d000r3.exepid Process 3508 0000000r00d000r3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0000000r00d000r3.exedescription pid Process Token: SeLoadDriverPrivilege 3508 0000000r00d000r3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmpfile-main\0000000r00d000r3.exe"C:\Users\Admin\AppData\Local\Temp\tmpfile-main\0000000r00d000r3.exe"1⤵
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3508