Resubmissions

24-01-2025 09:18

250124-k9qres1mfx 3

17-12-2024 05:00

241217-fndshs1pa1 7

21-11-2024 11:22

241121-ngwczssdmp 3

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    24-01-2025 09:18

Errors

Reason
Machine shutdown

General

  • Target

    test.exe

  • Size

    10.7MB

  • MD5

    04236e32abfe0a55c3b0383d54196e14

  • SHA1

    794aef5bf46e508e5800af34279e0cb6e201543a

  • SHA256

    0d92088225f8def668030ec98460107f6dbec6160c49de388d13bc060f2a95be

  • SHA512

    a13b247d12bb5f7774fdb2d504336346dd08c7bae68219df4324eb9aaea1196a01e04f16a57e84761a3249ad6d4df3f4a5337afb495a7059bd264e0b51f4459c

  • SSDEEP

    98304:SE4brn0EV1WUUHx2e/gyZp0oEApzTybeqK:T4XvbWUUH//gwuBA1W4

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3624
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      test.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:700
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      test.exe --help
      2⤵
        PID:2880
      • C:\Users\Admin\AppData\Local\Temp\test.exe
        test.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1588
      • C:\Users\Admin\AppData\Local\Temp\test.exe
        test.exe -h
        2⤵
          PID:5116
        • C:\Users\Admin\AppData\Local\Temp\test.exe
          test.exe -c
          2⤵
            PID:4320
          • C:\Users\Admin\AppData\Local\Temp\test.exe
            test.exe -dfjghdkfjgh
            2⤵
              PID:4556
            • C:\Users\Admin\AppData\Local\Temp\test.exe
              test.exe dfjghdkfjgh
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4560
            • C:\Users\Admin\AppData\Local\Temp\test.exe
              test.exe -pass kfj000000000000
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4688
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa3a1e055 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:956

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads