Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 11:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
386.exe
Resource
win7-20231025-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
386.exe
Resource
win10v2004-20231025-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
386.exe
-
Size
52KB
-
MD5
0a5cf7d53182d26113ccf6be223301dd
-
SHA1
95e7ebb570184a6011499ee88f09aaa8b39daf02
-
SHA256
dee91d6afa6e4a8bf023991ea457888d76fec872969537702f22a10b90409d20
-
SHA512
6a5351da8b1ec17a38e99abe0a53c07fb356e2a9b1cd531a9e7dc5e95714fad4670aea2b4c02103eaa03938c2afc22b28b710a650e08a17349b2548ee0ded6ef
-
SSDEEP
768:hHF+rNQD0FtTuTmLGMFi/oMJuE8oeCUqr8XOKrXkT/7LAWB:xF+hQpTmLGsURevq8OKG/7Mc
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 3884 dw20.exe Token: SeBackupPrivilege 3884 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3884 1524 386.exe 86 PID 1524 wrote to memory of 3884 1524 386.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\386.exe"C:\Users\Admin\AppData\Local\Temp\386.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7842⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3884
-