Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 17:31
Static task
static1
Behavioral task
behavioral1
Sample
password.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
password.exe
Resource
win10v2004-20241007-en
General
-
Target
password.exe
-
Size
1.1MB
-
MD5
fdadef5b0ffdb6fb4b92e94b9d5d0d5f
-
SHA1
a240fa366f81ae43749f961e75521451e5278847
-
SHA256
ea149a67bd03ce0925244fc64440de177c267185159bb6c7372598896658da91
-
SHA512
c61a9279bf636305c3a820c941c3bf40ddd0dba9224bdf8812d9c8b0f9277e6de17dd1f629d5ad46b8a81d5f8633af668acf05b0f5cb3c1e7ddb0a25b097fc95
-
SSDEEP
12288:3vTBBV98o0/+/mqruvu3YGLoYpse4reBlQAKxCqS1vpdSqmj2aGhYij5aBlkHk+Y:w0pFlQK/dSq4ra5dPf2XN+U
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google = "C:\\Users\\Admin\\AppData\\Roaming\\chrome.exe" password.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language password.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2232 dw20.exe Token: SeBackupPrivilege 2232 dw20.exe Token: SeBackupPrivilege 2232 dw20.exe Token: SeBackupPrivilege 2232 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2232 4900 password.exe 82 PID 4900 wrote to memory of 2232 4900 password.exe 82 PID 4900 wrote to memory of 2232 4900 password.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\password.exe"C:\Users\Admin\AppData\Local\Temp\password.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9202⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2232
-