Analysis

  • max time kernel
    187s
  • max time network
    193s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:24

General

  • Target

    ac878b4dc81d59a1735d6ba78d206dc17a4af84d41377e4fa83153cff752a5ac.exe

  • Size

    272KB

  • MD5

    c52214f7a917e6f3cd27306b4955e0e4

  • SHA1

    058170e86440aeca0387be271ae485ba0f0e8233

  • SHA256

    ac878b4dc81d59a1735d6ba78d206dc17a4af84d41377e4fa83153cff752a5ac

  • SHA512

    1a2136172c4c0de5536e1364926e40ce79fa6c55374b92c2aa0c7b33824ddb90162a4c005da20b415c2d21a8420cb0aef0f5bc38984ec76ecae3fcc412794563

  • SSDEEP

    6144:kv2/9fGWGvjBrQ1FUP239qH2+XVKjWHXUaGevQNDgmuzy3iAX1wV2ghj2c:xfGty9qHzFHjGeoNhM2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac878b4dc81d59a1735d6ba78d206dc17a4af84d41377e4fa83153cff752a5ac.exe
    "C:\Users\Admin\AppData\Local\Temp\ac878b4dc81d59a1735d6ba78d206dc17a4af84d41377e4fa83153cff752a5ac.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 840
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2928-132-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2928-134-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/2928-135-0x0000000074E50000-0x0000000075401000-memory.dmp

    Filesize

    5.7MB

  • memory/3076-133-0x0000000000000000-mapping.dmp