Analysis
-
max time kernel
35s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
38f420445be41ac7e3b71aa0ce0dceac.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
38f420445be41ac7e3b71aa0ce0dceac.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
38f420445be41ac7e3b71aa0ce0dceac.exe
-
Size
1.3MB
-
MD5
38f420445be41ac7e3b71aa0ce0dceac
-
SHA1
219c79176f0fc265885f14170c33cb06fdabd305
-
SHA256
be2a70a5280a1772ebe907f4f58e30e95d05e34578d3476c2e54c5cd444f5d5e
-
SHA512
586cdc7ed78df37cbed9381ea3d05884ca9964e508aedb88019792d4bc2593dda35d4dbcdfb133b810a850acb73565ad2343b7afc497ee3c2961b7050de5f1e4
-
SSDEEP
24576:hbXexCKdVAnWh553bHaqyZYtCLzFXLybS5q1wbXE:hbOxCtng55LH0cCLzF7yO5c
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2276 38f420445be41ac7e3b71aa0ce0dceac.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 3008 dw20.exe Token: SeBackupPrivilege 3008 dw20.exe Token: SeBackupPrivilege 3008 dw20.exe Token: SeBackupPrivilege 3008 dw20.exe Token: SeBackupPrivilege 3008 dw20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2276 38f420445be41ac7e3b71aa0ce0dceac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3008 2276 38f420445be41ac7e3b71aa0ce0dceac.exe 20 PID 2276 wrote to memory of 3008 2276 38f420445be41ac7e3b71aa0ce0dceac.exe 20 PID 2276 wrote to memory of 3008 2276 38f420445be41ac7e3b71aa0ce0dceac.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\38f420445be41ac7e3b71aa0ce0dceac.exe"C:\Users\Admin\AppData\Local\Temp\38f420445be41ac7e3b71aa0ce0dceac.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10042⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3008
-