Analysis

  • max time kernel
    137s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 18:53

General

  • Target

    13d17c285b5393e02bcd074db15cae846b95430e8578f9770fbe64b69cf33bab.exe

  • Size

    306KB

  • MD5

    5c667efaa7bf0490e024cc505f6edb9a

  • SHA1

    85bf0abf5fd9ece48448acb396bdef59f4996ee3

  • SHA256

    13d17c285b5393e02bcd074db15cae846b95430e8578f9770fbe64b69cf33bab

  • SHA512

    f987afd3753eeb19fc37e8b6aa802f7c79cb50f7f5dd754313204bf23d59e0a36e60bb6337e6a90cf190d7918e7cc8912de7912cec630afe6a942e6948c1637a

  • SSDEEP

    3072:jJ7q01JlrSSvnvOTvUDhJ0r0rdIbZQ4Hd01JlrSlvovOQvGDhJ0r0rdIbZQ7hQoZ:tO01PXPAArdIb7Hd01P4QTirdIb2hRZ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13d17c285b5393e02bcd074db15cae846b95430e8578f9770fbe64b69cf33bab.exe
    "C:\Users\Admin\AppData\Local\Temp\13d17c285b5393e02bcd074db15cae846b95430e8578f9770fbe64b69cf33bab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 1432
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:3596
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3644 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:2800

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4764-0-0x00007FF894515000-0x00007FF894516000-memory.dmp

            Filesize

            4KB

          • memory/4764-1-0x00007FF894260000-0x00007FF894C01000-memory.dmp

            Filesize

            9.6MB

          • memory/4764-6-0x000000001C930000-0x000000001CDFE000-memory.dmp

            Filesize

            4.8MB

          • memory/4764-7-0x000000001CEA0000-0x000000001CF3C000-memory.dmp

            Filesize

            624KB

          • memory/4764-8-0x0000000001580000-0x0000000001588000-memory.dmp

            Filesize

            32KB

          • memory/4764-9-0x00007FF894260000-0x00007FF894C01000-memory.dmp

            Filesize

            9.6MB

          • memory/4764-16-0x00007FF894260000-0x00007FF894C01000-memory.dmp

            Filesize

            9.6MB