Analysis

  • max time kernel
    174s
  • max time network
    197s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 23:41

General

  • Target

    b99b38b665b893b70afa654124de86892db17ae29e7957712c4742b751fb473e.exe

  • Size

    452KB

  • MD5

    5107389d662b5b2bbd7c612293eba4f0

  • SHA1

    8f999fbc24f7ddb8f786b6815096dadbe3fe1b8c

  • SHA256

    b99b38b665b893b70afa654124de86892db17ae29e7957712c4742b751fb473e

  • SHA512

    997eea42e5f2d069b55f70382c4e6df2fb6731395802d89ebd17f9b0dd393278c215ac3590f736957a5fa86c3c8708d00ca2c942d8390be4d7851fb749324a0c

  • SSDEEP

    6144:5VQGolbtC4JRI0CJvJEr7+YQH8h6gmm50kGmUDPV6hJrssJYU:5qRVLyJ6+V8h6gmm50k9UsJXYU

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b99b38b665b893b70afa654124de86892db17ae29e7957712c4742b751fb473e.exe
    "C:\Users\Admin\AppData\Local\Temp\b99b38b665b893b70afa654124de86892db17ae29e7957712c4742b751fb473e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 872
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4124-133-0x0000000075420000-0x00000000759D1000-memory.dmp

          Filesize

          5.7MB

        • memory/4124-134-0x0000000075420000-0x00000000759D1000-memory.dmp

          Filesize

          5.7MB

        • memory/4124-135-0x0000000075420000-0x00000000759D1000-memory.dmp

          Filesize

          5.7MB