Analysis
-
max time kernel
9s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 13:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
AggregatorHost.exe
Resource
win10v2004-20241007-en
5 signatures
150 seconds
General
-
Target
AggregatorHost.exe
-
Size
314KB
-
MD5
e0a742f7c5fb4aef2320d014346e7dac
-
SHA1
98a7d86131886fd2268d036130c053294847249b
-
SHA256
e0de0de9d8dd73bb81e9ac6f14eb97f77382e4147d0c96ef9775d97d7ebd8968
-
SHA512
8c72d791515b276cd156299c854c59028e007e8de29543e9ce623d3fdb9914f58f3dd936d1c41d89b1249eaf5a6d6f1f16a87404ab3f3d3c411186eb328be024
-
SSDEEP
3072:IeJ1nbEscrZqjCL93z9yWbfIa3GQMcmTrLAzWaV49EHmHXgXB9ujzfQqpf5Z49aT:1coz4qphVmk4WUlZdzW0g59HFB
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3852 taskmgr.exe Token: SeSystemProfilePrivilege 3852 taskmgr.exe Token: SeCreateGlobalPrivilege 3852 taskmgr.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe 3852 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AggregatorHost.exe"C:\Users\Admin\AppData\Local\Temp\AggregatorHost.exe"1⤵PID:1436
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3852