Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 07:31
Static task
static1
Behavioral task
behavioral1
Sample
2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe
Resource
win10v2004-20220812-en
General
-
Target
2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe
-
Size
347KB
-
MD5
6ed500c2ab6ea0b6cc00f5b2885ab29a
-
SHA1
cc1a5d03bf1a90899f62b76c62db44e225cc9107
-
SHA256
2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0
-
SHA512
944e606bb17e78efaa33777c0792691f70f7c308a4d3cafa5ee7b6bb2c9bd3f6b0ec40b8d047d2bc45fba5674dd75e3c3d4426390d38e69c8597f0965f571683
-
SSDEEP
6144:zZhFeDTyGnAm+tBs1oAupUnMaolRdFQTF2osYzAt/+:Fb+duBs1oAuTaqRkLS+
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3620 set thread context of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4564 dw20.exe Token: SeBackupPrivilege 4564 dw20.exe Token: SeBackupPrivilege 4564 dw20.exe Token: SeBackupPrivilege 4564 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 3620 wrote to memory of 840 3620 2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe 80 PID 840 wrote to memory of 4564 840 vbc.exe 81 PID 840 wrote to memory of 4564 840 vbc.exe 81 PID 840 wrote to memory of 4564 840 vbc.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe"C:\Users\Admin\AppData\Local\Temp\2aac12c7492486efe7effc0db1e088e41d7a6626d776a210cc1998972c0a0ed0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7883⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-