Analysis
-
max time kernel
173s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 07:29
Static task
static1
Behavioral task
behavioral1
Sample
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe
Resource
win10v2004-20220414-en
General
-
Target
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe
-
Size
15.0MB
-
MD5
35ecc52f8d324f88c65432ca49d6f223
-
SHA1
4102ef0264dac3521052e1acb32bca0c12162cae
-
SHA256
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3
-
SHA512
e91092fc235acda0f9d71e3867f11b3c237627aa69049a8588b3466e3efb09663eab11f046e56f9b87aaa988322c0e1d8ea1278565624c152922da8972e1a50a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
dw20.exedescription pid Process Token: SeRestorePrivilege 5104 dw20.exe Token: SeBackupPrivilege 5104 dw20.exe Token: SeBackupPrivilege 5104 dw20.exe Token: SeBackupPrivilege 5104 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exedescription pid Process procid_target PID 2496 wrote to memory of 5104 2496 026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe 82 PID 2496 wrote to memory of 5104 2496 026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe 82 PID 2496 wrote to memory of 5104 2496 026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe"C:\Users\Admin\AppData\Local\Temp\026beaf36cb34931a5e173f71873b451ef43a889c1c09aa0b071641c6c3345d3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 11282⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5104
-