Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 09:36
Static task
static1
Behavioral task
behavioral1
Sample
14b20bf69f68663b454770439a5db101.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14b20bf69f68663b454770439a5db101.exe
Resource
win10v2004-20231215-en
General
-
Target
14b20bf69f68663b454770439a5db101.exe
-
Size
355KB
-
MD5
14b20bf69f68663b454770439a5db101
-
SHA1
780f5ea02e4891fe7e804f6c98c7ff857982271c
-
SHA256
41189078ecff3579f5a183a4e77b6b04a24e62311aed8ba59949478c27681520
-
SHA512
ce2a420f5793e6a817ff189f83fd8ed317abd9a6c72cd1321fd557078c4a0bd7099e96d7ba78402d77020d08622eb1349db8af3045a7213dfd6a846e5b2f556a
-
SSDEEP
3072:Je2dEPj5oyVGS/G7be2dEPj5oyVGS/G7tujE/fsi9Puxy6am+VYYiIInXneOq9ZX:JvdEP1KvdEP1Uj4yGNVnXexljvdEP1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4820 dw20.exe Token: SeBackupPrivilege 4820 dw20.exe Token: SeBackupPrivilege 4820 dw20.exe Token: SeBackupPrivilege 4820 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4820 4068 14b20bf69f68663b454770439a5db101.exe 91 PID 4068 wrote to memory of 4820 4068 14b20bf69f68663b454770439a5db101.exe 91 PID 4068 wrote to memory of 4820 4068 14b20bf69f68663b454770439a5db101.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\14b20bf69f68663b454770439a5db101.exe"C:\Users\Admin\AppData\Local\Temp\14b20bf69f68663b454770439a5db101.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8682⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4820
-