Resubmissions
12-02-2025 14:54
250212-r9zgwswmej 1012-02-2025 14:27
250212-rsdtvsvqet 1012-02-2025 14:17
250212-rl7hlavngy 1012-02-2025 13:47
250212-q3q2hatqes 1012-02-2025 13:43
250212-q1d9xstlap 1011-02-2025 01:03
250211-behmwstpdv 10Analysis
-
max time kernel
185s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 13:43
Static task
static1
Behavioral task
behavioral1
Sample
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
Resource
win10v2004-20250207-en
General
-
Target
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
Size
8.5MB
-
MD5
2d690d32e637c43a18aa8f4f2fd28e48
-
SHA1
f8a5f75a34d2751c0e7195cd4adabddc1ece465e
-
SHA256
beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e9
-
SHA512
2641192c4ebb0a66fdf6a9be16ccfc38a4cd98a32467d5b6e719c73b2893a28888b7c9c77d3db3a0d2e93d14408081bdc92238dc3a5b1479229843f354c7305e
-
SSDEEP
196608:exCyu9hdCjcHsm2gTEE/OBBZVaMKb0QqNnJi6lWzVYK5P6qwpxFlWavvy7:ervy
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 46 832 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3916 MicrosoftEdgeUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3256 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3256 taskmgr.exe Token: SeSystemProfilePrivilege 3256 taskmgr.exe Token: SeCreateGlobalPrivilege 3256 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe 3256 taskmgr.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\beed61dc63e3b01b93e6c50c6885b89988b59a3f6abdfa24e922e1402a0235e91⤵PID:4184
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTExNDIwNDczIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3916
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3256