Analysis
-
max time kernel
180s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:04
Static task
static1
Behavioral task
behavioral1
Sample
1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe
Resource
win10v2004-20220812-en
General
-
Target
1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe
-
Size
82KB
-
MD5
44a194f8568c4f2e2de359c57442f280
-
SHA1
bb2304012ede2c1bab8d66e5786c7e5632e1d288
-
SHA256
1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402
-
SHA512
ab083b7cd90a6b51b46418ba6de4285e57b7413b48b63a17a5154293cc563dcbe9fe9ff02634835316fa982c51edf42dddd6ddef2ab037089a350dc638e49726
-
SSDEEP
1536:CBsKwh6ruAy+sGOnJMHvdZ/KNkEZFnt/nujkqkSZZZ3gdtibiOA1:CBXwhR+jOJg7KbnujSUlbi
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 2464 dw20.exe Token: SeBackupPrivilege 2464 dw20.exe Token: SeBackupPrivilege 2464 dw20.exe Token: SeBackupPrivilege 2464 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exedescription pid process target process PID 4900 wrote to memory of 2464 4900 1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe dw20.exe PID 4900 wrote to memory of 2464 4900 1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe dw20.exe PID 4900 wrote to memory of 2464 4900 1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe"C:\Users\Admin\AppData\Local\Temp\1bfab11d08cd59342e8815fc90cc8672305885241379698637b85065da0c4402.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8122⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2464