Analysis

  • max time kernel
    74s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 18:19

General

  • Target

    6de1ea6377afcce0eb6d73582fb85e12ee13746a52092f909692d6d241122c5d.exe

  • Size

    55KB

  • MD5

    858caf1d6b98ec7e67913c17435acc20

  • SHA1

    c226d5e617905102f22f36f33708fc45e67cedd8

  • SHA256

    6de1ea6377afcce0eb6d73582fb85e12ee13746a52092f909692d6d241122c5d

  • SHA512

    e847c636c14c5f23132c4f58f9df4ec75e8883914e9c782b405fc8b4eaa1b8d505784650234cca77aa26d2a20a7205a21706db5b0f2898cea5bbfd1b7d82f126

  • SSDEEP

    1536:kFS9QrSmsNf2PXa8D6nOdcvT/h7zQk9HBLfjRrV9X:kg9QsNfu6nyWFphrxX

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6de1ea6377afcce0eb6d73582fb85e12ee13746a52092f909692d6d241122c5d.exe
    "C:\Users\Admin\AppData\Local\Temp\6de1ea6377afcce0eb6d73582fb85e12ee13746a52092f909692d6d241122c5d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 1676
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2172

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2960-133-0x00007FF82C700000-0x00007FF82D136000-memory.dmp

    Filesize

    10.2MB