Resubmissions
02-05-2023 01:01
230502-bc8rashc34 702-05-2023 00:11
230502-ag1e2shb52 701-05-2023 21:35
230501-1fjc9agg85 801-05-2023 20:20
230501-y4lgeaad31 7Analysis
-
max time kernel
1811s -
max time network
1583s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2023 01:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DBS.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
1800 seconds
General
-
Target
DBS.exe
-
Size
683KB
-
MD5
7c12f6fec9bc7980dd057bff668edfee
-
SHA1
09581aea5c7737e401181a4c1af42898cb5c363e
-
SHA256
2219e96c7736e6edc02fe0ff151ee8e0116b8b0dbcf38d7ee91ab246b4fed0a0
-
SHA512
906cd2e4515d224b223675c015e0afcde2d7c8bafa9b316a4f49710d9ebb9a67c26e316e02b34953d4e1507fcff72d4d52ef4e608368165debe72158512e43b2
-
SSDEEP
12288:PZZ2iNvj2vIUMgaw+UzS/soUHBaqLcKc8V5:n1tjCTa8S/2HkqL5
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation DBS.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 3456 1668 DBS.exe 94 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 DBS.exe 1668 DBS.exe 1668 DBS.exe 1668 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe 3456 DBS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1668 DBS.exe Token: SeDebugPrivilege 3456 DBS.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1504 1668 DBS.exe 92 PID 1668 wrote to memory of 1504 1668 DBS.exe 92 PID 1668 wrote to memory of 1504 1668 DBS.exe 92 PID 1668 wrote to memory of 3480 1668 DBS.exe 93 PID 1668 wrote to memory of 3480 1668 DBS.exe 93 PID 1668 wrote to memory of 3480 1668 DBS.exe 93 PID 1668 wrote to memory of 3456 1668 DBS.exe 94 PID 1668 wrote to memory of 3456 1668 DBS.exe 94 PID 1668 wrote to memory of 3456 1668 DBS.exe 94 PID 1668 wrote to memory of 3456 1668 DBS.exe 94 PID 1668 wrote to memory of 3456 1668 DBS.exe 94 PID 1668 wrote to memory of 3456 1668 DBS.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBS.exe"C:\Users\Admin\AppData\Local\Temp\DBS.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\DBS.exe"C:\Users\Admin\AppData\Local\Temp\DBS.exe"2⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\DBS.exe"C:\Users\Admin\AppData\Local\Temp\DBS.exe"2⤵PID:3480
-
-
C:\Users\Admin\AppData\Local\Temp\DBS.exe"C:\Users\Admin\AppData\Local\Temp\DBS.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456
-