Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 13:20
Behavioral task
behavioral1
Sample
godot-jolt_windows-x64.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
godot-jolt_windows-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
한판마안!.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
한판마안!.exe
Resource
win10v2004-20241007-en
General
-
Target
한판마안!.exe
-
Size
249KB
-
MD5
b7437af1a7cf4f11cd8de605f3139127
-
SHA1
6601f9a986d683cb9dec9b87ec5db6174362615c
-
SHA256
6dfaa7cba9ca8dea70442224b8b61b1cd75984b9949ecf1a31ec1644375cfe6d
-
SHA512
43570327980e612e6a5bd4f11d92cd8b7cab22b2e8795072ec3c9c42d6b2cdc4ba8732d48cb496b29c5e3a840d72df939ed006478859a00fd19852d5c07d6d13
-
SSDEEP
6144:yJQ5DxaMePfQNfFUzU9cQyMh67lWT14K9t8fmBZT:IeD0MGoNaYcE67lO/9tMg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 한판마안!.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2472 dw20.exe Token: SeBackupPrivilege 2472 dw20.exe Token: SeBackupPrivilege 2472 dw20.exe Token: SeBackupPrivilege 2472 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 976 wrote to memory of 2472 976 한판마안!.exe 90 PID 976 wrote to memory of 2472 976 한판마안!.exe 90 PID 976 wrote to memory of 2472 976 한판마안!.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\한판마안!.exe"C:\Users\Admin\AppData\Local\Temp\한판마안!.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8522⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2472
-