Analysis
-
max time kernel
114s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
ebf0465a5f3713ec6dde96f33bf91040N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ebf0465a5f3713ec6dde96f33bf91040N.exe
Resource
win10v2004-20240802-en
General
-
Target
ebf0465a5f3713ec6dde96f33bf91040N.exe
-
Size
2.0MB
-
MD5
ebf0465a5f3713ec6dde96f33bf91040
-
SHA1
1698cdcc8b0a4e32ae670bb5fa97864bd5c86266
-
SHA256
ffae3a0767f2b231876cfd87c418931e15dc5a675774d39a86ed0193322a2951
-
SHA512
bcdcb40224ecc7f3fa23081e01ca693a8dd2cd06234af245d2b3a047f372aefda0689b3010e5345a5d44ee3a6ee8e462a9263db719f10ae883fe86006b9fd152
-
SSDEEP
24576:YD39v74lfGQrFUspugRNJI2DJ53J/J/L56+JYJXBRvlceiJoR:Yp7E+QrFUBgq2Yco
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebf0465a5f3713ec6dde96f33bf91040N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3768 dw20.exe Token: SeBackupPrivilege 3768 dw20.exe Token: SeBackupPrivilege 3768 dw20.exe Token: SeBackupPrivilege 3768 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4196 wrote to memory of 3768 4196 ebf0465a5f3713ec6dde96f33bf91040N.exe 85 PID 4196 wrote to memory of 3768 4196 ebf0465a5f3713ec6dde96f33bf91040N.exe 85 PID 4196 wrote to memory of 3768 4196 ebf0465a5f3713ec6dde96f33bf91040N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf0465a5f3713ec6dde96f33bf91040N.exe"C:\Users\Admin\AppData\Local\Temp\ebf0465a5f3713ec6dde96f33bf91040N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4402⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:3768
-