Analysis
-
max time kernel
56s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 10:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
COCKTA~1.exe
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
COCKTA~1.exe
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
COCKTA~1.exe
-
Size
570KB
-
MD5
706bf659bc3470be42613799580e036e
-
SHA1
1e84f53882e3fa8563b9ed4ad63bd98a31efe9ce
-
SHA256
c88df8c97951601cf7fdbe9d81ca0d9f64a0022b03dfd44d50795375d8a1980f
-
SHA512
cc494cc196ea48e401cc9095c2a6959b15f689366c44cf584a4c359a9d341dbc97935caf9feeb682d84ccbe4a4555757d697966344b73237434eab7e610f5d58
-
SSDEEP
3072:JLarXJo8tA5egsi5ivZMJyFtfIKwAbf0T5OyQRmss7e6NWZZndH6lYZc:gAiCozIlAbs0yQR07fUZNdh
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1232 dw20.exe Token: SeBackupPrivilege 1232 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3772 wrote to memory of 1232 3772 COCKTA~1.exe 87 PID 3772 wrote to memory of 1232 3772 COCKTA~1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\COCKTA~1.exe"C:\Users\Admin\AppData\Local\Temp\COCKTA~1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 10082⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1232
-