Analysis

  • max time kernel
    111s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 08:05

General

  • Target

    cd348d71f661068d9dd46398c96cca90c02f312bab2b22dec01d66f5284f8906.exe

  • Size

    348KB

  • MD5

    80ef8d50f98a0c3e38d2ee95e5b80865

  • SHA1

    7a2af904ed0c5ecad27dde8e75894a387684f4cd

  • SHA256

    cd348d71f661068d9dd46398c96cca90c02f312bab2b22dec01d66f5284f8906

  • SHA512

    57e7fa916d8514890f1ebcea29119b88d5041bde752a1a8f3c218201c501115c80e6ab768bbc06e4d946597add9fcf7648b9066ae08f1d50abee370b7572a4e6

  • SSDEEP

    6144:CX3eEJaE4phmat0eDZMKO9HpbWg6uB/iZJN5d99bzdi6s3X+O9RS:43eG7khmat0eDZMKOHscsbnbUztS

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd348d71f661068d9dd46398c96cca90c02f312bab2b22dec01d66f5284f8906.exe
    "C:\Users\Admin\AppData\Local\Temp\cd348d71f661068d9dd46398c96cca90c02f312bab2b22dec01d66f5284f8906.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1056
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4528-132-0x0000000074E20000-0x00000000753D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4528-134-0x0000000074E20000-0x00000000753D1000-memory.dmp

    Filesize

    5.7MB