Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 15:25
Static task
static1
Behavioral task
behavioral1
Sample
mono crypter.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
mono crypter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
phonex.exe
Resource
win7-20240903-en
General
-
Target
mono crypter.exe
-
Size
9KB
-
MD5
62c723973f715675df73fa05cbec054c
-
SHA1
1263be85fa87b17f54eb919d729dd1b7513b0e3e
-
SHA256
e7e4c97ceb46bc8b0964ee3979b8358b26de2e545a042b88e729e41574249074
-
SHA512
e73d38d2a421960d7d8b9ebd8685cf050b25931d2ad9fa25a56653a28bd8ed07e0ef6f0a9143b7f64633bd916ad98fddea1f99654871c4bf999543d6bba475d1
-
SSDEEP
96:8/L77IOY86NIHUCJgsb1Zap3hxZD8cE2+YlnlYJomLLGL0KfflwVEBiAj1TRXmmU:OL0L0UoZ83tDpVHnlYJ3KLTqVpCwVvI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mono crypter.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1460 dw20.exe Token: SeBackupPrivilege 1460 dw20.exe Token: SeBackupPrivilege 1460 dw20.exe Token: SeBackupPrivilege 1460 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1460 1340 mono crypter.exe 82 PID 1340 wrote to memory of 1460 1340 mono crypter.exe 82 PID 1340 wrote to memory of 1460 1340 mono crypter.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\mono crypter.exe"C:\Users\Admin\AppData\Local\Temp\mono crypter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9122⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1460
-