Analysis

  • max time kernel
    130s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 11:30

General

  • Target

    De4dot [Modded ArmDot]/AssemblyServer-CLR20.exe

  • Size

    5KB

  • MD5

    c0bb148fe70f58a3fe5bc59b9fb75011

  • SHA1

    8b893ec93ec57e0797715658b7eedf6fab7c0ec8

  • SHA256

    db0e50089cf8b71e660bcdcdff7dde554f77ecbeb9469cd75bb1764bcedcd8b2

  • SHA512

    88d1f50caecafcd803747643182bf9f8458fe8beff896544cae7c8a7ba97812772c1d1bb8de2ce9d71b943b31ef13715e94a9d332798689cc7986f26b951224e

  • SSDEEP

    48:6C1FdJYL4jgDMPtPORGrlv7TpKKWMACCVCGpfbNtm:BBJ7jg2txHvRYUIzNt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot]\AssemblyServer-CLR20.exe
    "C:\Users\Admin\AppData\Local\Temp\De4dot [Modded ArmDot]\AssemblyServer-CLR20.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 796
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:4816
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4608,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3264 /prefetch:8
    1⤵
      PID:4980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1148-0-0x00000000747D2000-0x00000000747D3000-memory.dmp

      Filesize

      4KB

    • memory/1148-1-0x00000000747D0000-0x0000000074D81000-memory.dmp

      Filesize

      5.7MB

    • memory/1148-8-0x00000000747D0000-0x0000000074D81000-memory.dmp

      Filesize

      5.7MB