Analysis
-
max time kernel
91s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 14:46
Static task
static1
Behavioral task
behavioral1
Sample
c3a1c86f2601027892ae0b811de97ec3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3a1c86f2601027892ae0b811de97ec3.exe
Resource
win10v2004-20231215-en
General
-
Target
c3a1c86f2601027892ae0b811de97ec3.exe
-
Size
26KB
-
MD5
c3a1c86f2601027892ae0b811de97ec3
-
SHA1
4edf05ca185149189f3e04922b4bb998237bf2da
-
SHA256
b16de5a88afd43f43e50894cc567a1e54e5e3216abf7b106258f7ab397013ff5
-
SHA512
a70cadad2f862bad09733c2a11e936b768b2384b6f0fb9ce519bc198a2c1a36e5fd5ec1b0807559c07e76211aadc3f75eb472658cc950bc798c4a512b097a39a
-
SSDEEP
384:tdUKwCxbgSWFT+zNklKNT9jny+c1J+LYF2EQJdryQyn4a3Zsnh:nUKwCxbgSuqzNklKrnBSQJNfyH3Zsh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5072 dw20.exe Token: SeBackupPrivilege 5072 dw20.exe Token: SeBackupPrivilege 5072 dw20.exe Token: SeBackupPrivilege 5072 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3852 wrote to memory of 5072 3852 c3a1c86f2601027892ae0b811de97ec3.exe 85 PID 3852 wrote to memory of 5072 3852 c3a1c86f2601027892ae0b811de97ec3.exe 85 PID 3852 wrote to memory of 5072 3852 c3a1c86f2601027892ae0b811de97ec3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3a1c86f2601027892ae0b811de97ec3.exe"C:\Users\Admin\AppData\Local\Temp\c3a1c86f2601027892ae0b811de97ec3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7922⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5072
-