Analysis

  • max time kernel
    146s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:09

General

  • Target

    570dfb40480c399fd3c4fdd583eed0434c56306a423abbf9ccf56f1aacc8af7c.exe

  • Size

    156KB

  • MD5

    8f3b4ef91ab479ea77718ef3f8eb9872

  • SHA1

    bc25e13503165000f710febaebe2d4c6e66c78ef

  • SHA256

    570dfb40480c399fd3c4fdd583eed0434c56306a423abbf9ccf56f1aacc8af7c

  • SHA512

    af9d6cb4a9d90b7f9df713215d61ca55071164eb8afa79363007317bae0b8ffa6ea4179c737579d5731c05f49010b223c58ef8e30b394ce5875f840e25928133

  • SSDEEP

    3072:7MUzI+9CLfb75NUmfYQp/IRLsqd1pIecTH:7MWIACLT7wgYDs4pG

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\570dfb40480c399fd3c4fdd583eed0434c56306a423abbf9ccf56f1aacc8af7c.exe
    "C:\Users\Admin\AppData\Local\Temp\570dfb40480c399fd3c4fdd583eed0434c56306a423abbf9ccf56f1aacc8af7c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 808
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1872-133-0x0000000074AB0000-0x0000000075061000-memory.dmp

    Filesize

    5.7MB

  • memory/1872-134-0x0000000074AB0000-0x0000000075061000-memory.dmp

    Filesize

    5.7MB

  • memory/2556-132-0x0000000000000000-mapping.dmp