Analysis

  • max time kernel
    90s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 12:59

General

  • Target

    $EXEFILE.exe

  • Size

    395KB

  • MD5

    b6187f0c1988856febc68427a75cd6b4

  • SHA1

    36cfbce55c933426e83e24d555678abaff9144dd

  • SHA256

    bf8ba9ca7e61a412495770f79e86b5e0785c8e7d5631266fd7bbde177bb4d2c3

  • SHA512

    c5203cf80d9d9be47300e1d5aeeb84453cf8ccf0c91b30ce3a455b44757f818c6c6b516aa2d437b064220c616e026bfa15e8c9c0a1f308228024fa6f45cacc96

  • SSDEEP

    6144:2MLZcA4YLZ9rfRRoEx3pQqsOo7WDs4QUX0S:2mZcA4YLZ9rJRoCm3qVtX7

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$EXEFILE.exe
    "C:\Users\Admin\AppData\Local\Temp\$EXEFILE.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 2272
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:2920

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5024-0-0x00007FFE86630000-0x00007FFE86FD1000-memory.dmp
    Filesize

    9.6MB

  • memory/5024-1-0x0000000001080000-0x0000000001090000-memory.dmp
    Filesize

    64KB

  • memory/5024-12-0x0000000001130000-0x000000000113E000-memory.dmp
    Filesize

    56KB

  • memory/5024-13-0x000000001C5A0000-0x000000001CA6E000-memory.dmp
    Filesize

    4.8MB

  • memory/5024-14-0x000000001BFB0000-0x000000001C04C000-memory.dmp
    Filesize

    624KB

  • memory/5024-15-0x0000000001120000-0x0000000001128000-memory.dmp
    Filesize

    32KB

  • memory/5024-16-0x0000000001080000-0x0000000001090000-memory.dmp
    Filesize

    64KB

  • memory/5024-17-0x0000000001080000-0x0000000001090000-memory.dmp
    Filesize

    64KB

  • memory/5024-24-0x00007FFE86630000-0x00007FFE86FD1000-memory.dmp
    Filesize

    9.6MB