Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 03:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
120 seconds
General
-
Target
c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe
-
Size
450KB
-
MD5
0cdcfd0f2e00569e5383c30523c795a0
-
SHA1
95f92c2c1a7b4b7feea5845869fbd677b58d3fea
-
SHA256
c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498
-
SHA512
8d704fbe2b970746bbc804f8a6ec712c57fe45b177316945a6be08767066de6a7761569dce6f0a0b8651fa4bd38696b918ee7b2971b86364628ba1b7cd2208ea
-
SSDEEP
12288:bImkStbLBTfYH6eFUIKH8gZ7QIy/1FR1s5MpbNewd3wo:rJYLE80MN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 1228 dw20.exe Token: SeBackupPrivilege 1228 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1228 2232 c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe 86 PID 2232 wrote to memory of 1228 2232 c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe"C:\Users\Admin\AppData\Local\Temp\c8e9bfca5c5b5121f675033f8ca05e88442910f3132549307619e21b6e0dd498N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7842⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1228
-