Overview
overview
10Static
static
1010f703168c...d0.exe
windows7-x64
610f703168c...d0.exe
windows10-2004-x64
62c21fa0fe0...37.exe
windows7-x64
12c21fa0fe0...37.exe
windows10-2004-x64
44f6f22b1e2...37.exe
windows7-x64
74f6f22b1e2...37.exe
windows10-2004-x64
79f2d8507d2...52.dll
windows7-x64
19f2d8507d2...52.dll
windows10-2004-x64
1Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
10f703168cc43f60bfd54c69242d3db63d2d60e1114de74956a2439b8a8b3ed0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
10f703168cc43f60bfd54c69242d3db63d2d60e1114de74956a2439b8a8b3ed0.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
4f6f22b1e21fcb1b48bb34c2f430246d873c7f211a03f3e83d24a560d0ff1a37.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
4f6f22b1e21fcb1b48bb34c2f430246d873c7f211a03f3e83d24a560d0ff1a37.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
9f2d8507d23e9dfea8317f366ae968063e332c93635d1f6d1c75a6d7e5552f52.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
9f2d8507d23e9dfea8317f366ae968063e332c93635d1f6d1c75a6d7e5552f52.dll
Resource
win10v2004-20230221-en
General
-
Target
2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe
-
Size
520KB
-
MD5
d97db65ecab73ea41b8c4662e0ca1db5
-
SHA1
158d50341f38f236573c67ad757d6b323de4a8eb
-
SHA256
2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037
-
SHA512
82f5c361caf085e4698c7b6448cf4a9d23cbfe8bca8d0b0f599e1225b3f0b2cc7f0d4d4592550c0da204098aef170ea0996db91325c18665f7bb2dd25a022060
-
SSDEEP
12288:uqd700hXiHYaUyqYCeLNk1EpJTeTmAE9:d70QXi4gLYEpJSTF
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 5088 dw20.exe Token: SeBackupPrivilege 5088 dw20.exe Token: SeBackupPrivilege 5088 dw20.exe Token: SeBackupPrivilege 5088 dw20.exe Token: SeBackupPrivilege 5088 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 5088 2348 2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe 81 PID 2348 wrote to memory of 5088 2348 2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe 81 PID 2348 wrote to memory of 5088 2348 2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe"C:\Users\Admin\AppData\Local\Temp\2c21fa0fe0c3ad261925eb51f822d48fb107287bf3819cd0dc22a118394d1037.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7602⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5088
-