Analysis
-
max time kernel
21s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 17:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DiceGorge Windows/DiceGorge.exe
Resource
win7-20240220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
DiceGorge Windows/DiceGorge.exe
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
DiceGorge Windows/DiceGorge.exe
-
Size
14.9MB
-
MD5
10f8659736982e4dc75ea5027263d3c6
-
SHA1
c7c03cf5ef64fa7d8f8aeaee8ad8d14acefd630f
-
SHA256
6ec3f993102ee56eb5c9951bd5000ac4c623dba90b63ce4d1533682db62a9942
-
SHA512
d2aad75f2593bee303368716f05230ee98c3e899f171af2d29db55489713b306cb007a10e7105cd117a4fb034e699802d2dc7fd75cb3e1373a83b939ded8f247
-
SSDEEP
393216:XWg4SsMpArze5pWyFdClpRHuQOZBMJRbONtUrzN3UsRpK06rMP:8MI35pK06Q
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiceGorge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiceGorge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString DiceGorge.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe 4916 DiceGorge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3248 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3248 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 DiceGorge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiceGorge Windows\DiceGorge.exe"C:\Users\Admin\AppData\Local\Temp\DiceGorge Windows\DiceGorge.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4916
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3dc 0x4681⤵
- Suspicious use of AdjustPrivilegeToken
PID:3248