Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
b8cda93c41b564c86f88c2ed9401eb8a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8cda93c41b564c86f88c2ed9401eb8a.exe
Resource
win10v2004-20240226-en
General
-
Target
b8cda93c41b564c86f88c2ed9401eb8a.exe
-
Size
89KB
-
MD5
b8cda93c41b564c86f88c2ed9401eb8a
-
SHA1
e09986e206d7d8b76ecdcad1b67bb00242f7bc9b
-
SHA256
4536579cee89a758c84d47a888082e23144de75a19bb0f7096f994ea346cef78
-
SHA512
bcc3a13e1c3894b82cc36ec7d24bf6e67a18c44564a9ae06a2d0b449a4ee2b6e6d3a456a311d7a6b165eac1718e29530e9a69bdcdf1aefe41bafd7b060718569
-
SSDEEP
1536:wZYlPuU+bLpdSVR39XuZ3Wd2IbpzKOB4WVazUEzODaIj9tCz53VhWQ9+Dt9BZynQ:wZYlPIkR39XuZ3wRK04WVaz7uf9tKWQg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2216 b8cda93c41b564c86f88c2ed9401eb8a.exe Token: SeRestorePrivilege 1148 dw20.exe Token: SeBackupPrivilege 1148 dw20.exe Token: SeBackupPrivilege 1148 dw20.exe Token: SeBackupPrivilege 1148 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1148 2216 b8cda93c41b564c86f88c2ed9401eb8a.exe 94 PID 2216 wrote to memory of 1148 2216 b8cda93c41b564c86f88c2ed9401eb8a.exe 94 PID 2216 wrote to memory of 1148 2216 b8cda93c41b564c86f88c2ed9401eb8a.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8cda93c41b564c86f88c2ed9401eb8a.exe"C:\Users\Admin\AppData\Local\Temp\b8cda93c41b564c86f88c2ed9401eb8a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 24402⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:468