Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 04:02
Behavioral task
behavioral1
Sample
Perm.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Perm.exe
Resource
win10v2004-20250314-en
General
-
Target
Perm.exe
-
Size
164KB
-
MD5
08cc4c87314d8c879928c346ecb0e598
-
SHA1
75b97801226c54fdd1d47b9590d64e0f48b9e35c
-
SHA256
08a7b6d933538350b7634e495a43a3bbc758e824cc4dbf75a2bce1d32c82d252
-
SHA512
acd5202dd036b2f78945efd200b3feb428e382db2fbc7a17ef66fdc77811813b91a7cd4145922a1156a730740510e05b03d5c975f76c04135cdef780084750e5
-
SSDEEP
3072:Cb56/a6rnl+OZYET34CNUfETJRg3IbgNeNYcGzl:CbAej5fEDgYbgzcGz
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Perm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Perm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Perm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TASKKILL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe -
Kills process with taskkill 6 IoCs
pid Process 5104 TASKKILL.exe 2404 TASKKILL.exe 3156 TASKKILL.exe 1196 TASKKILL.exe 2580 TASKKILL.exe 4252 TASKKILL.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2188 schtasks.exe 3960 schtasks.exe 2284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 4012 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 3520 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe 2460 Perm.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4012 Perm.exe Token: SeDebugPrivilege 2580 TASKKILL.exe Token: SeDebugPrivilege 1196 TASKKILL.exe Token: SeRestorePrivilege 2328 dw20.exe Token: SeBackupPrivilege 2328 dw20.exe Token: SeBackupPrivilege 2328 dw20.exe Token: SeBackupPrivilege 2328 dw20.exe Token: SeBackupPrivilege 2328 dw20.exe Token: SeDebugPrivilege 3520 Perm.exe Token: SeDebugPrivilege 4252 TASKKILL.exe Token: SeDebugPrivilege 5104 TASKKILL.exe Token: SeBackupPrivilege 2984 dw20.exe Token: SeBackupPrivilege 2984 dw20.exe Token: SeDebugPrivilege 2460 Perm.exe Token: SeDebugPrivilege 2404 TASKKILL.exe Token: SeDebugPrivilege 3156 TASKKILL.exe Token: SeBackupPrivilege 2644 dw20.exe Token: SeBackupPrivilege 2644 dw20.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4012 wrote to memory of 1196 4012 Perm.exe 90 PID 4012 wrote to memory of 1196 4012 Perm.exe 90 PID 4012 wrote to memory of 1196 4012 Perm.exe 90 PID 4012 wrote to memory of 2580 4012 Perm.exe 91 PID 4012 wrote to memory of 2580 4012 Perm.exe 91 PID 4012 wrote to memory of 2580 4012 Perm.exe 91 PID 4012 wrote to memory of 4660 4012 Perm.exe 101 PID 4012 wrote to memory of 4660 4012 Perm.exe 101 PID 4012 wrote to memory of 4660 4012 Perm.exe 101 PID 4012 wrote to memory of 2188 4012 Perm.exe 103 PID 4012 wrote to memory of 2188 4012 Perm.exe 103 PID 4012 wrote to memory of 2188 4012 Perm.exe 103 PID 4012 wrote to memory of 2328 4012 Perm.exe 105 PID 4012 wrote to memory of 2328 4012 Perm.exe 105 PID 4012 wrote to memory of 2328 4012 Perm.exe 105 PID 3520 wrote to memory of 4252 3520 Perm.exe 117 PID 3520 wrote to memory of 4252 3520 Perm.exe 117 PID 3520 wrote to memory of 4252 3520 Perm.exe 117 PID 3520 wrote to memory of 5104 3520 Perm.exe 118 PID 3520 wrote to memory of 5104 3520 Perm.exe 118 PID 3520 wrote to memory of 5104 3520 Perm.exe 118 PID 3520 wrote to memory of 2188 3520 Perm.exe 121 PID 3520 wrote to memory of 2188 3520 Perm.exe 121 PID 3520 wrote to memory of 2188 3520 Perm.exe 121 PID 3520 wrote to memory of 3960 3520 Perm.exe 123 PID 3520 wrote to memory of 3960 3520 Perm.exe 123 PID 3520 wrote to memory of 3960 3520 Perm.exe 123 PID 3520 wrote to memory of 2984 3520 Perm.exe 125 PID 3520 wrote to memory of 2984 3520 Perm.exe 125 PID 3520 wrote to memory of 2984 3520 Perm.exe 125 PID 2460 wrote to memory of 2404 2460 Perm.exe 127 PID 2460 wrote to memory of 2404 2460 Perm.exe 127 PID 2460 wrote to memory of 2404 2460 Perm.exe 127 PID 2460 wrote to memory of 3156 2460 Perm.exe 129 PID 2460 wrote to memory of 3156 2460 Perm.exe 129 PID 2460 wrote to memory of 3156 2460 Perm.exe 129 PID 2460 wrote to memory of 4740 2460 Perm.exe 131 PID 2460 wrote to memory of 4740 2460 Perm.exe 131 PID 2460 wrote to memory of 4740 2460 Perm.exe 131 PID 2460 wrote to memory of 2284 2460 Perm.exe 133 PID 2460 wrote to memory of 2284 2460 Perm.exe 133 PID 2460 wrote to memory of 2284 2460 Perm.exe 133 PID 2460 wrote to memory of 2644 2460 Perm.exe 135 PID 2460 wrote to memory of 2644 2460 Perm.exe 135 PID 2460 wrote to memory of 2644 2460 Perm.exe 135
Processes
-
C:\Users\Admin\AppData\Local\Temp\Perm.exe"C:\Users\Admin\AppData\Local\Temp\Perm.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Perm.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2188
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 17282⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\Perm.exeC:\Users\Admin\AppData\Local\Temp\Perm.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Perm.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3960
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 11402⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\Perm.exeC:\Users\Admin\AppData\Local\Temp\Perm.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Perm.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2284
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10162⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2644
-