Analysis
-
max time kernel
138s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2023 11:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SoundcardSelector.exe
Resource
win7-20231020-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
SoundcardSelector.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
SoundcardSelector.exe
-
Size
28KB
-
MD5
65dfe0e113a2385f792b3e4750a1f57c
-
SHA1
a04260e8bd279a7a48f8ce735f7551916591ada4
-
SHA256
0cad80d77df92287c3823b526a50f93d74708a3d5dafeade7e2ee1f725fa1a2c
-
SHA512
b2e101bffe394650173b130faa4043d40a6d76f6c42a851ee31c8802be744c4812040eedd3d2b8ed800f1bccdc9dbee309e6bf8bd4566825e4c373ba13a94446
-
SSDEEP
384:EkLEqmv2Q6u2Y+jC00mS1a7+pbkTKVsh5PO4:EkLEkbA7b9Vsh5p
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 3380 dw20.exe Token: SeBackupPrivilege 3380 dw20.exe Token: SeBackupPrivilege 3380 dw20.exe Token: SeBackupPrivilege 3380 dw20.exe Token: SeBackupPrivilege 3380 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3380 2544 SoundcardSelector.exe 86 PID 2544 wrote to memory of 3380 2544 SoundcardSelector.exe 86 PID 2544 wrote to memory of 3380 2544 SoundcardSelector.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\SoundcardSelector.exe"C:\Users\Admin\AppData\Local\Temp\SoundcardSelector.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8722⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3380
-