Analysis

  • max time kernel
    182s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 09:41

General

  • Target

    24931340358473cb9bccdc3dfe2f6f6fd3fb6e36b20565a3b105f3853d7c041e.exe

  • Size

    616KB

  • MD5

    511f45557bea35c24633cb1480ccc363

  • SHA1

    ea51f7fd561decf6187ab799bb43304cb139c9a6

  • SHA256

    24931340358473cb9bccdc3dfe2f6f6fd3fb6e36b20565a3b105f3853d7c041e

  • SHA512

    7a238a704c4c10ddec89fb512949f7f40888d5c004d0283628988f1a3a3553acee20dc68245fc792b3e50199a86b22195880edc6359ef65c692ee740bf7de066

  • SSDEEP

    12288:0Rs+yhnbRCbd9FY0WjrUkrn429GCFIbPZnECkQaLPvqeoq:0RsZhntCbd9a0Wkon19GCWbBnECkZvqW

Score
8/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24931340358473cb9bccdc3dfe2f6f6fd3fb6e36b20565a3b105f3853d7c041e.exe
    "C:\Users\Admin\AppData\Local\Temp\24931340358473cb9bccdc3dfe2f6f6fd3fb6e36b20565a3b105f3853d7c041e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4996
    • C:\ProgramData\DCSCRES_SERVERW\DCSCRES_SERVERW.exe
      C:\ProgramData\DCSCRES_SERVERW\DCSCRES_SERVERW.exe
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\DCSCRES_SERVERW\DCSCRES_SERVERW.exe

    Filesize

    271KB

    MD5

    ad8015d3abafaa1628830241400b695c

    SHA1

    8ae8ffaf92b868a5791af8fbb904e0214425852c

    SHA256

    e49013002ba21224d2552d3120ee0bd18108fc443b4c75a92fde7c421c5b3a24

    SHA512

    92d6b03caeaad1f85462675f03feff4486c04919bece0116c996c3273c88c00bd9f87023b3081342c1c2c3e1ef1fbbe28eef31eff55e4c1652acd21e4e73c36d

  • C:\ProgramData\DCSCRES_SERVERW\DCSCRES_SERVERW.exe

    Filesize

    271KB

    MD5

    ad8015d3abafaa1628830241400b695c

    SHA1

    8ae8ffaf92b868a5791af8fbb904e0214425852c

    SHA256

    e49013002ba21224d2552d3120ee0bd18108fc443b4c75a92fde7c421c5b3a24

    SHA512

    92d6b03caeaad1f85462675f03feff4486c04919bece0116c996c3273c88c00bd9f87023b3081342c1c2c3e1ef1fbbe28eef31eff55e4c1652acd21e4e73c36d

  • memory/1484-136-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/1484-137-0x0000000000400000-0x00000000004C5000-memory.dmp

    Filesize

    788KB

  • memory/4996-132-0x000000001B820000-0x000000001C256000-memory.dmp

    Filesize

    10.2MB