Analysis
-
max time kernel
31s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
d2a3920599c879171cbea0ad7e5bba80N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2a3920599c879171cbea0ad7e5bba80N.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
d2a3920599c879171cbea0ad7e5bba80N.exe
-
Size
627KB
-
MD5
d2a3920599c879171cbea0ad7e5bba80
-
SHA1
fa6397588f6a365c03afe34df8b957fbc7d11ad0
-
SHA256
2a138fd3779c59999f3445ccb52acf8867051a99211e5d90c1dd8bbf5b515a16
-
SHA512
936d677e1fda0003c9205d1eb91c8287a8d38a9d3610904b2f7b863ff92c9fa719696ebe6bc3999de9129c6e8c2ac41248f88929e2729fa65d71895d64b5ec06
-
SSDEEP
12288:9R6dUnDlCiZNXD+bWfsSv7yK00G0QgZ1y:nDVNT0IF2KnI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2a3920599c879171cbea0ad7e5bba80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1272 dw20.exe Token: SeBackupPrivilege 1272 dw20.exe Token: SeBackupPrivilege 1272 dw20.exe Token: SeBackupPrivilege 1272 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1272 4684 d2a3920599c879171cbea0ad7e5bba80N.exe 84 PID 4684 wrote to memory of 1272 4684 d2a3920599c879171cbea0ad7e5bba80N.exe 84 PID 4684 wrote to memory of 1272 4684 d2a3920599c879171cbea0ad7e5bba80N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2a3920599c879171cbea0ad7e5bba80N.exe"C:\Users\Admin\AppData\Local\Temp\d2a3920599c879171cbea0ad7e5bba80N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8362⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1272
-