Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 03:50
Static task
static1
Behavioral task
behavioral1
Sample
6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe
Resource
win10v2004-20220812-en
General
-
Target
6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe
-
Size
760KB
-
MD5
08331d69e2e3571168f2d8ee776d9fee
-
SHA1
958c7e75b127d0d3046bf9151262de561c92bdfc
-
SHA256
6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48
-
SHA512
dff5ebdf7b5678b281d7bd7e25f1ac95bb758bcb8cd575a8ac8534d7b64db3e47b237698972f839d2554bbdb7d1ea4cfc00db9b7c1a18fcba8a59c1697422fad
-
SSDEEP
12288:HE4wxVCGSkyJoocXWr7Halo3nTlbZ7x+9Zm/p5r1EA2YdQEVfWSUJIFLxYBOss6O:HMQ4u+angzIQkUoD81RFip
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe -
Loads dropped DLL 4 IoCs
pid Process 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe = "C:\\Users\\Admin\\AppData\\Roaming\\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\\0.0.0.0\\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe" 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe Token: SeBackupPrivilege 5028 dw20.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4740 wrote to memory of 1236 4740 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 81 PID 4740 wrote to memory of 1236 4740 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 81 PID 4740 wrote to memory of 1236 4740 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 81 PID 1236 wrote to memory of 5028 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 82 PID 1236 wrote to memory of 5028 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 82 PID 1236 wrote to memory of 5028 1236 6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe"C:\Users\Admin\AppData\Local\Temp\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exeC:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9483⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe
Filesize760KB
MD508331d69e2e3571168f2d8ee776d9fee
SHA1958c7e75b127d0d3046bf9151262de561c92bdfc
SHA2566dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48
SHA512dff5ebdf7b5678b281d7bd7e25f1ac95bb758bcb8cd575a8ac8534d7b64db3e47b237698972f839d2554bbdb7d1ea4cfc00db9b7c1a18fcba8a59c1697422fad
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\6dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48.exe
Filesize760KB
MD508331d69e2e3571168f2d8ee776d9fee
SHA1958c7e75b127d0d3046bf9151262de561c92bdfc
SHA2566dc12394c4706bc4ff9a2bb7cfe2d42bb5d536cd1190b2cfbe520f1dfb093c48
SHA512dff5ebdf7b5678b281d7bd7e25f1ac95bb758bcb8cd575a8ac8534d7b64db3e47b237698972f839d2554bbdb7d1ea4cfc00db9b7c1a18fcba8a59c1697422fad
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\User32.dll
Filesize18KB
MD55fa07d6c6384d703766d7935de68850e
SHA162f28a572b4d1d359db7017235912ad2599b8c1d
SHA256120e15dcc4a957649553cd92a5477db9dcbfd9a2cd821e1c904044b5a92d726f
SHA5127775375f44e0cb00f9bffc023d797dbdb01ebe8429ccfacd7df57beb04427ef309c192d571051242aad1bc400f721f449f86deeb1e5f5d64b6f516bf24e92cc4
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\User32.dll
Filesize18KB
MD55fa07d6c6384d703766d7935de68850e
SHA162f28a572b4d1d359db7017235912ad2599b8c1d
SHA256120e15dcc4a957649553cd92a5477db9dcbfd9a2cd821e1c904044b5a92d726f
SHA5127775375f44e0cb00f9bffc023d797dbdb01ebe8429ccfacd7df57beb04427ef309c192d571051242aad1bc400f721f449f86deeb1e5f5d64b6f516bf24e92cc4
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\User32.dll
Filesize18KB
MD55fa07d6c6384d703766d7935de68850e
SHA162f28a572b4d1d359db7017235912ad2599b8c1d
SHA256120e15dcc4a957649553cd92a5477db9dcbfd9a2cd821e1c904044b5a92d726f
SHA5127775375f44e0cb00f9bffc023d797dbdb01ebe8429ccfacd7df57beb04427ef309c192d571051242aad1bc400f721f449f86deeb1e5f5d64b6f516bf24e92cc4
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\User32.dll
Filesize18KB
MD55fa07d6c6384d703766d7935de68850e
SHA162f28a572b4d1d359db7017235912ad2599b8c1d
SHA256120e15dcc4a957649553cd92a5477db9dcbfd9a2cd821e1c904044b5a92d726f
SHA5127775375f44e0cb00f9bffc023d797dbdb01ebe8429ccfacd7df57beb04427ef309c192d571051242aad1bc400f721f449f86deeb1e5f5d64b6f516bf24e92cc4
-
C:\Users\Admin\AppData\Roaming\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\lwOcxluTOqsZtyHwcllkpMTaFSRhkn\0.0.0.0\User32.dll
Filesize18KB
MD55fa07d6c6384d703766d7935de68850e
SHA162f28a572b4d1d359db7017235912ad2599b8c1d
SHA256120e15dcc4a957649553cd92a5477db9dcbfd9a2cd821e1c904044b5a92d726f
SHA5127775375f44e0cb00f9bffc023d797dbdb01ebe8429ccfacd7df57beb04427ef309c192d571051242aad1bc400f721f449f86deeb1e5f5d64b6f516bf24e92cc4