Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 01:19

General

  • Target

    fuckingd.exe

  • Size

    543KB

  • MD5

    833356789e61d413831ad57abb56f18f

  • SHA1

    9f66b79515eee9e89d81a427e8ec9cffd6a14f7a

  • SHA256

    773a8e4217175a02536ccc0f078d831e6b6d4537ddec171209153bcf6649137b

  • SHA512

    4e97d21e5091c1cf7eed0e209e108573353ec61ef5e0ee1fd3eb200128a9f1b526a89ecaac67697c4bd438404c926f615366820f77ff83746493c963ad38e8ee

  • SSDEEP

    12288:RJpOcp0E8XQYpUS2lGA0SyiVZp1YIjXug:RnOcp0TvvAzyiDpSIjv

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fuckingd.exe
    "C:\Users\Admin\AppData\Local\Temp\fuckingd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3972
    • C:\Windows\SYSTEM32\CMD.exe
      "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System" /tr "C:\Windows\WindowsDefender" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Windows\system32\schtasks.exe
        SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "System" /tr "C:\Windows\WindowsDefender"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3700
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3040
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:3108
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3040-13-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-3-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-4-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-2-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-14-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-12-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-11-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-10-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-9-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3040-8-0x00000201FE9F0000-0x00000201FE9F1000-memory.dmp

      Filesize

      4KB

    • memory/3972-1-0x0000000000E90000-0x0000000000F1E000-memory.dmp

      Filesize

      568KB

    • memory/3972-0-0x00007FFEBCFA3000-0x00007FFEBCFA5000-memory.dmp

      Filesize

      8KB

    • memory/3972-15-0x00007FFEBCFA3000-0x00007FFEBCFA5000-memory.dmp

      Filesize

      8KB