Analysis
-
max time kernel
146s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 13:41
Static task
static1
Behavioral task
behavioral1
Sample
2289aa5f72ebcb3a517b4069174618b1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2289aa5f72ebcb3a517b4069174618b1.exe
Resource
win10v2004-20231215-en
General
-
Target
2289aa5f72ebcb3a517b4069174618b1.exe
-
Size
864KB
-
MD5
2289aa5f72ebcb3a517b4069174618b1
-
SHA1
47d910f92b26a0d9b9c5b77a93098569261fb985
-
SHA256
743c0c8feb27f9817c78778b6c98d0a895f15e1db8e5c9beebe4195676d86b7b
-
SHA512
45d8b411b2ee8c46ae2833808c2f2cfef8e44bb87f282a8b76f943fe063d1e4a6d769e580a9b81ae0b4b791b2c3433545fd4d2535d99ddc123a31deaded9cfe8
-
SSDEEP
12288:prXpX3TZJD4uZ8fWrmCBHH3prXpX3TZJD4uZ8fWrmCBgBcZViDY/:9XtDZJDYfWrmCBtXtDZJDYfWrmCBYfg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3948 2289aa5f72ebcb3a517b4069174618b1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3948 2289aa5f72ebcb3a517b4069174618b1.exe Token: SeBackupPrivilege 2612 dw20.exe Token: SeBackupPrivilege 2612 dw20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3948 wrote to memory of 3668 3948 2289aa5f72ebcb3a517b4069174618b1.exe 92 PID 3948 wrote to memory of 3668 3948 2289aa5f72ebcb3a517b4069174618b1.exe 92 PID 3948 wrote to memory of 2612 3948 2289aa5f72ebcb3a517b4069174618b1.exe 91 PID 3948 wrote to memory of 2612 3948 2289aa5f72ebcb3a517b4069174618b1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2289aa5f72ebcb3a517b4069174618b1.exe"C:\Users\Admin\AppData\Local\Temp\2289aa5f72ebcb3a517b4069174618b1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 9922⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\2289aa5f72ebcb3a517b4069174618b1.exeC:\Users\Admin\AppData\Local\Temp\2289aa5f72ebcb3a517b4069174618b1.exe2⤵PID:3668
-