Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 08:52

General

  • Target

    9df64a03bea85ca00b9f5bc0249cd10978f190c5953f90773fb12bb2c954f593.exe

  • Size

    401KB

  • MD5

    c4422e1d596b2d610874f13b61b0adfd

  • SHA1

    a5baf4f8243fee83622be9af3935cab402d8c74f

  • SHA256

    9df64a03bea85ca00b9f5bc0249cd10978f190c5953f90773fb12bb2c954f593

  • SHA512

    18aebbe63df2acdab9e1a2f91fe867522fcfe1ae4ebe91debc8702e65f9ff000141b1e6cc92f07d223c3a339dcdf2a8d84e2c5f0c165454d6d3673446ca35763

  • SSDEEP

    6144:tpl4xgH4OcFePEUWPSpPVHJ0gAwLf838vNZDcw3KQz1bi4AaiTbBp:tpl7fEUESpJG7wL/zDciKq1rJivBp

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9df64a03bea85ca00b9f5bc0249cd10978f190c5953f90773fb12bb2c954f593.exe
    "C:\Users\Admin\AppData\Local\Temp\9df64a03bea85ca00b9f5bc0249cd10978f190c5953f90773fb12bb2c954f593.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 824
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:5024

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4964-135-0x00007FFCED520000-0x00007FFCEDF56000-memory.dmp

    Filesize

    10.2MB