Analysis

  • max time kernel
    139s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 20:47

General

  • Target

    1c244b1f50f55f89e2d6e97a2650c17f.exe

  • Size

    15KB

  • MD5

    1c244b1f50f55f89e2d6e97a2650c17f

  • SHA1

    f3f36a4ac366933fc0e01fb769c7e76805415a0c

  • SHA256

    6ad1afc9cd2a694ee3ac7a2eb42f449593aac80de6fbf7b2a43f438404261d0f

  • SHA512

    45bbc6e0d3d462493f560b6f0f8e0701045b64e488fbd058bbdf38e4a17c6a7d80bd077e1850df7aaa4b451aebfef16051545e925afbfd214740c71ee1506955

  • SSDEEP

    192:gurp3A3xUy16oRFbMIWcvmGI6iOIWcBY7DHCR3+IWP9uy/1BZHl6H9Dp:guoUefWCxQWQzR3ZWPkybhS9p

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c244b1f50f55f89e2d6e97a2650c17f.exe
    "C:\Users\Admin\AppData\Local\Temp\1c244b1f50f55f89e2d6e97a2650c17f.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 1512
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:5068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4696-0-0x0000000075120000-0x00000000756D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4696-1-0x00000000010E0000-0x00000000010F0000-memory.dmp

    Filesize

    64KB

  • memory/4696-2-0x0000000075120000-0x00000000756D1000-memory.dmp

    Filesize

    5.7MB

  • memory/4696-19-0x0000000075120000-0x00000000756D1000-memory.dmp

    Filesize

    5.7MB