Analysis

  • max time kernel
    96s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 19:28

General

  • Target

    d2ef2a079f0a647e4bce95def7ecf036c89e5bc15fbdb89a8b03989433619174.exe

  • Size

    184KB

  • MD5

    903cbce9fc911442d0cc955208abc700

  • SHA1

    421216d70f36018bf0d38e3ce08fd4959b57dec8

  • SHA256

    d2ef2a079f0a647e4bce95def7ecf036c89e5bc15fbdb89a8b03989433619174

  • SHA512

    4911ba1fee56db19e2814960b4d1d603bf89abe1b4957814e891cfd171e19f8ad8b3b812663f71a1b7741decb9dd4844e1b1e769ee9004afc35e90b9ae860836

  • SSDEEP

    3072:BZd24t5JaZDHRT6RkfTnMT4PaGweqGVT+k2bDywgbZ5NmQEUZ/UxX8GGlHG4O2Tk:BZd24t58NHt6RgTnMT4PaGweqGVT+k2

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2ef2a079f0a647e4bce95def7ecf036c89e5bc15fbdb89a8b03989433619174.exe
    "C:\Users\Admin\AppData\Local\Temp\d2ef2a079f0a647e4bce95def7ecf036c89e5bc15fbdb89a8b03989433619174.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 772
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:4848

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2276-132-0x00007FF8A7E10000-0x00007FF8A8846000-memory.dmp

          Filesize

          10.2MB