Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 03:54
Static task
static1
Behavioral task
behavioral1
Sample
aInjector Win64_x32.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
aInjector Win64_x32.exe
-
Size
2.8MB
-
MD5
04083f1648e2b2805b6a37e6019fdeab
-
SHA1
c8159ba9893416c3056e9ef69386daf064c45863
-
SHA256
27b0fd5d8ef7f364dc1e472920c0ea54f758de1083c95b5084f867c528593d7b
-
SHA512
ff3bfdf6313bd12759c5e83dcc3740c2452d191adeecdba1dab0283da77f906f42d9a4594ce8a81ed270dc1f66e54c62e556a06eb8bc95e39cd4a74467c60478
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3144 created 1008 3144 WerFault.exe aInjector Win64_x32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
aInjector Win64_x32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aInjector Win64_x32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aInjector Win64_x32.exe -
Processes:
resource yara_rule behavioral2/memory/1008-119-0x0000000000AA0000-0x0000000000AA1000-memory.dmp themida -
Processes:
aInjector Win64_x32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aInjector Win64_x32.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
aInjector Win64_x32.exepid process 1008 aInjector Win64_x32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3144 1008 WerFault.exe aInjector Win64_x32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe 3144 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
aInjector Win64_x32.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1008 aInjector Win64_x32.exe Token: SeRestorePrivilege 3144 WerFault.exe Token: SeBackupPrivilege 3144 WerFault.exe Token: SeDebugPrivilege 3144 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aInjector Win64_x32.exe"C:\Users\Admin\AppData\Local\Temp\aInjector Win64_x32.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 662042⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144
-