Analysis

  • max time kernel
    112s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 01:07

General

  • Target

    0033a6aca8cff1978b4f8741460d106079f9e062f8d5b3742a53b0a64df2c523.exe

  • Size

    160KB

  • MD5

    0b0a89f909298a0dca1becf0127c1be0

  • SHA1

    3870d6d5bd2bef602f852acace627329b1848e1a

  • SHA256

    0033a6aca8cff1978b4f8741460d106079f9e062f8d5b3742a53b0a64df2c523

  • SHA512

    22bc10685ead7976d54bae647dfc219d6d70157774c013308242a1733f71b3b62c445a4a3ec62220d833db7751091916f17a0fe819bb2c9d2bb1ca1166c76701

  • SSDEEP

    3072:LaesCEp4+fvzIyRArYTb9KZ60pjMU7VccXA9KQjQHi2O:up4+fvVRmjGU7VCwFi2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0033a6aca8cff1978b4f8741460d106079f9e062f8d5b3742a53b0a64df2c523.exe
    "C:\Users\Admin\AppData\Local\Temp\0033a6aca8cff1978b4f8741460d106079f9e062f8d5b3742a53b0a64df2c523.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 780
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4920-132-0x00007FFB84410000-0x00007FFB84E46000-memory.dmp

    Filesize

    10.2MB