Analysis
-
max time kernel
40s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-uk -
resource tags
arch:x64arch:x86image:win10v2004-20250313-uklocale:uk-uaos:windows10-2004-x64systemwindows -
submitted
29/03/2025, 11:13
Behavioral task
behavioral1
Sample
Kaspersky.exe
Resource
win10v2004-20250313-uk
5 signatures
600 seconds
General
-
Target
Kaspersky.exe
-
Size
93KB
-
MD5
21086f6e286e14d92875c313f5807222
-
SHA1
5f980d447ea546062d0980f1611009c44249678e
-
SHA256
579308fdc781bdf6f4500650c1cbd99e41c82e5ce3b08f6d4cf0ac0d1e47a043
-
SHA512
bc9b67143c559243ea752b205dbb72493f14741c80db2f1a41d1d2e7606c73e70eeae32a35a19735045144ab0e9dc337d63568fe88f0756b321db8f5257b180e
-
SSDEEP
768:ZY3Rl530YTXspgM0m2zGjpyDtdXWuDtXfLWh2XxrjEtCdnl2pi1Rz4Rk3msGdpG3:ilZ0AA0mT1mrWgLljEwzGi1dDiDGgS
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kaspersky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4640 dw20.exe Token: SeBackupPrivilege 4640 dw20.exe Token: SeBackupPrivilege 4640 dw20.exe Token: SeBackupPrivilege 4640 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4640 2400 Kaspersky.exe 86 PID 2400 wrote to memory of 4640 2400 Kaspersky.exe 86 PID 2400 wrote to memory of 4640 2400 Kaspersky.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Kaspersky.exe"C:\Users\Admin\AppData\Local\Temp\Kaspersky.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4642⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4640
-