Analysis

  • max time kernel
    61s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2022 00:06

General

  • Target

    cbb74dd6e424ffafffb03e121bcacd7e31e6e47fba77363faff03e9e20d16526.exe

  • Size

    235KB

  • MD5

    0c4535a6eaeab79ee4e454af1c7a4f00

  • SHA1

    d039f85e43f3c530d8566e49bc5c4c74cf926cef

  • SHA256

    cbb74dd6e424ffafffb03e121bcacd7e31e6e47fba77363faff03e9e20d16526

  • SHA512

    e8afa59cde6a9b02c2093ac05fa2f2af8748b192c7e90f9cc3ede490b47bf75f4434e93743dd0f50ebe60100f901338926115cda7f637f19f076ffe7a46e46cd

  • SSDEEP

    3072:xJXC2HSA1F3GLsQawFsGIyeBHeFuXtJuB0oy5ApmDixS2U2tt3qC:Py4SIsL5jhIyewFu9Jf35AXxS2U2P6

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbb74dd6e424ffafffb03e121bcacd7e31e6e47fba77363faff03e9e20d16526.exe
    "C:\Users\Admin\AppData\Local\Temp\cbb74dd6e424ffafffb03e121bcacd7e31e6e47fba77363faff03e9e20d16526.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 912
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:4872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4480-132-0x00000000754A0000-0x0000000075A51000-memory.dmp

    Filesize

    5.7MB

  • memory/4480-134-0x00000000754A0000-0x0000000075A51000-memory.dmp

    Filesize

    5.7MB

  • memory/4872-133-0x0000000000000000-mapping.dmp