Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
3b3f9f0a37b008a261a2d6aeaf89de4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b3f9f0a37b008a261a2d6aeaf89de4c.exe
Resource
win10v2004-20231222-en
General
-
Target
3b3f9f0a37b008a261a2d6aeaf89de4c.exe
-
Size
617KB
-
MD5
3b3f9f0a37b008a261a2d6aeaf89de4c
-
SHA1
5983b5500f3c969f60c89642c43bdb2dbd482fd3
-
SHA256
22ae51059a846a1598833fbec1b4a4c8ac4e5992682db55d6b789a16879132ca
-
SHA512
ed114aedd332bb3a327cc2d4d9d1cf1460394f8c2dfc225f0674b1fb5a40782a0ba77bca7c83746037dc19d29ecb3a5ddcf9560a82039af819e7fbf8b5fbe932
-
SSDEEP
12288:JwMDD4/3Dy0ws7lpzRuGm2n7p8Oh2TowFN/mK0:Jtg/20bTpmc00Cm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2760 DownloadManager.exe -
Loads dropped DLL 7 IoCs
pid Process 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini DownloadManager.exe File opened for modification C:\Windows\assembly\Desktop.ini DownloadManager.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly DownloadManager.exe File created C:\Windows\assembly\Desktop.ini DownloadManager.exe File opened for modification C:\Windows\assembly\Desktop.ini DownloadManager.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1244 dw20.exe Token: SeBackupPrivilege 1244 dw20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2760 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 90 PID 2200 wrote to memory of 2760 2200 3b3f9f0a37b008a261a2d6aeaf89de4c.exe 90 PID 2760 wrote to memory of 1244 2760 DownloadManager.exe 91 PID 2760 wrote to memory of 1244 2760 DownloadManager.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b3f9f0a37b008a261a2d6aeaf89de4c.exe"C:\Users\Admin\AppData\Local\Temp\3b3f9f0a37b008a261a2d6aeaf89de4c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\DM_Lyxpld03Nw\DownloadManager.exeDownloadManager.exe "C:\Users\Admin\AppData\Local\Temp\3b3f9f0a37b008a261a2d6aeaf89de4c.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 19443⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5919eb3462f256b07182e9b78b6947081
SHA1f5cd62ae17a855435ed47760e1714c9322efa6a7
SHA2566466b09366e092e20e8cbbe31dabf0c93ec1f4f6deafbf39e790af0f2a024550
SHA5122ac88dd1ee40cf1cc702ff23312cc6382f1c3286fd70e29da656ca2e64ae633e2bce34a1109325139625955cb25a49b5ffb3b6889925f8201568b83871cab542
-
Filesize
697KB
MD5580a37eadbb94a79f832f9ecc472cd28
SHA125dfe70084bd84aea46ff1f0b2e92d289fcf0611
SHA2568d7a8e71a2e0140c5eace1dbc0a6f522378b782f3d9dc5eef40b4635d2759e47
SHA5121baecaa4c0111cdd83d05d224034673ecd1dc71eeff41d8cfee457ef735493d02d758cce2aa85054b4ce65351821af49fc398ed057c17c8eba887da7b57ce5ab
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
20KB
MD5c498ae64b4971132bba676873978de1e
SHA192e4009cd776b6c8616d8bffade7668ef3cb3c27
SHA2565552bdde7e4113393f683ef501e4cc84dccc071bdc51391ea7fa3e7c1d49e4e8
SHA5128e5ca35493f749a39ceae6796d2658ba10f7d8d9ceca45bb4365b338fabd1dfa9b9f92e33f50c91b0273e66adfbce4b98b09c15fd2473f8b214ed797462333d7
-
Filesize
16KB
MD5a555472395178ac8c733d90928e05017
SHA1f44b192d66473f01a6540aaec4b6c9ac4c611d35
SHA25682ae08fced4a1f9a7df123634da5f4cb12af4593a006bef421a54739a2cbd44e
SHA512e6d87b030c45c655d93b2e76d7437ad900df5da2475dd2e6e28b6c872040491e80f540b00b6091d16bc8410bd58a1e82c62ee1b17193ef8500a153d4474bb80a