Analysis
-
max time kernel
29s -
max time network
25s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17/01/2025, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
05C665B2A34C8011E275AB40B3E26E7F.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
05C665B2A34C8011E275AB40B3E26E7F.exe
-
Size
903KB
-
MD5
05c665b2a34c8011e275ab40b3e26e7f
-
SHA1
080a29cf40766c2a9ad84ee238aebe8096ea2ef1
-
SHA256
ed1b7db008a31d99560f934344dbea4aa1ac94979a0578a4c39856d24598b472
-
SHA512
ff505825f62555dbac72f486f3c12c36c300843b6feb82a58fa42aeedc868af1f70e518e3bd75faba44b0846f6d2e72c0cf0ae874d3652b6b3f6bd37a43861d8
-
SSDEEP
24576:5cW9nP4TMlVH80VNmkSwWp1C68FaQtpg:5cGwTMlVH8GmkZQC2E
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1764 created 3672 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 57 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lcpwin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcpwin.exe" 05C665B2A34C8011E275AB40B3E26E7F.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05C665B2A34C8011E275AB40B3E26E7F.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2826969134-2088669430-2680400721-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1764 05C665B2A34C8011E275AB40B3E26E7F.exe Token: SeDebugPrivilege 32 taskmgr.exe Token: SeSystemProfilePrivilege 32 taskmgr.exe Token: SeCreateGlobalPrivilege 32 taskmgr.exe Token: SeDebugPrivilege 1764 05C665B2A34C8011E275AB40B3E26E7F.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe 32 taskmgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87 PID 1764 wrote to memory of 2356 1764 05C665B2A34C8011E275AB40B3E26E7F.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\05C665B2A34C8011E275AB40B3E26E7F.exe"C:\Users\Admin\AppData\Local\Temp\05C665B2A34C8011E275AB40B3E26E7F.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /02⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\05C665B2A34C8011E275AB40B3E26E7F.exe"C:\Users\Admin\AppData\Local\Temp\05C665B2A34C8011E275AB40B3E26E7F.exe"2⤵PID:2356
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3112