Analysis
-
max time kernel
112s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2022 09:08
Static task
static1
Behavioral task
behavioral1
Sample
3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe
Resource
win7-20220812-en
7 signatures
150 seconds
General
-
Target
3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe
-
Size
307KB
-
MD5
4f132ec553364939e2a885ed6ae4b050
-
SHA1
8d99c64848b593e8cfe131b47d36ebccaa28f336
-
SHA256
3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd
-
SHA512
437314c3b697b7d5c89bd3f53aac13b77c04f18b68b1053e6443f62e95c7293655279b4877492066c314e585908f8f9d86262a2950aab4e652e60fd42a030a05
-
SSDEEP
6144:hsjD5nX5L2tIgfLBwJgQN2gCo9fzFBW9s:hmX5L2tIgfKJg259fm
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 988 set thread context of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe Token: SeDebugPrivilege 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe Token: SeRestorePrivilege 3892 dw20.exe Token: SeBackupPrivilege 3892 dw20.exe Token: SeBackupPrivilege 3892 dw20.exe Token: SeBackupPrivilege 3892 dw20.exe Token: SeBackupPrivilege 3892 dw20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 988 wrote to memory of 4468 988 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 84 PID 4468 wrote to memory of 3892 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 87 PID 4468 wrote to memory of 3892 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 87 PID 4468 wrote to memory of 3892 4468 3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe"C:\Users\Admin\AppData\Local\Temp\3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe"C:\Users\Admin\AppData\Local\Temp\3058b3cb64ce72c823561ddfa92022262adfd572b5dcfa6e6688800d7c2ab8dd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 15243⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-