Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2024 01:55
Behavioral task
behavioral1
Sample
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe
Resource
win10v2004-20231215-en
General
-
Target
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe
-
Size
492KB
-
MD5
eaf1baf94ce6c382e26902604e9dd013
-
SHA1
4214df85da1c917ac72ef3d051086f09c2b69099
-
SHA256
1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c
-
SHA512
9f7c24c55fcf3720d3c6ee56ea1d1f90ec4b2942a9a88d7f7073ca377f6921cdb5ed94325e9a93043d9b62141fe6b52c1d934ec52bf6269f751199fed9b47bf5
-
SSDEEP
12288:BZyBBD04d4ZbuwXWuvQBQn7FfhIMu6GL831dCth:nyjCb1tn7FfhIMjGL86b
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 3660 dw20.exe Token: SeBackupPrivilege 3660 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3660 5108 1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe 84 PID 5108 wrote to memory of 3660 5108 1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe"C:\Users\Admin\AppData\Local\Temp\1cc6cf68882661395df57d43e89a3e76fd576d77057977a1f65e468bc3e9737c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7282⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3660
-