Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
ExeFile (83).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ExeFile (83).exe
Resource
win10v2004-20240802-en
General
-
Target
ExeFile (83).exe
-
Size
622KB
-
MD5
ba04e842e78270cbf6fb2ac5b8a78cee
-
SHA1
04b5e9c956984c0344c074030122d178e661ad86
-
SHA256
9d4758703ed1e3968a75f93405df6202a6b1b749f7806965560c23237fdfe2b4
-
SHA512
787d97583a275fea7ee709dd2b08f6b2320b963aae99f0e0cf36325d12e362e9d5b2790741ee87ec6189507684e10288f0266a71e9fe617bd0ca85028536a8c9
-
SSDEEP
12288:/NCz9D68kHEzzpKNpzKx3lPyXFFyrkH1Q1AEcKqqhDIsMSK4+qrFGVtLt2:wzPnpK3KLSTm19qsDI+K41FGVZ4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ExeFile (83).exedw20.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExeFile (83).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeBackupPrivilege 1808 dw20.exe Token: SeBackupPrivilege 1808 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ExeFile (83).exedescription pid process target process PID 1740 wrote to memory of 1808 1740 ExeFile (83).exe dw20.exe PID 1740 wrote to memory of 1808 1740 ExeFile (83).exe dw20.exe PID 1740 wrote to memory of 1808 1740 ExeFile (83).exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExeFile (83).exe"C:\Users\Admin\AppData\Local\Temp\ExeFile (83).exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10882⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:81⤵PID:3996