Analysis
-
max time kernel
125s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
13-02-2022 23:35
Static task
static1
Behavioral task
behavioral1
Sample
d02798629a25f74b9a5340cd3a5b1070cecbdffe04332c76c20f31357440b5fd.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d02798629a25f74b9a5340cd3a5b1070cecbdffe04332c76c20f31357440b5fd.dll
Resource
win10v2004-en-20220113
General
-
Target
d02798629a25f74b9a5340cd3a5b1070cecbdffe04332c76c20f31357440b5fd.dll
-
Size
156KB
-
MD5
f1bd39b9c385e63a373e4cfcf569cd53
-
SHA1
8cfc211e04f866450637a6f4c124eb44be86e86e
-
SHA256
d02798629a25f74b9a5340cd3a5b1070cecbdffe04332c76c20f31357440b5fd
-
SHA512
0c99c62bf1f35e6a2eefbcc476bcc705e5370fcc4ceb32b6aa827a993c683443b602201e85d30440abea56bbf2f193c57b58f9f89de12f4fe429a6d213a7a65d
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2764 created 4456 2764 WerFault.exe rundll32.exe -
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4776 4456 WerFault.exe rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
WerFault.exepid process 4776 WerFault.exe 4776 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WerFault.exesvchost.exeTiWorker.exedescription pid process Token: SeRestorePrivilege 4776 WerFault.exe Token: SeBackupPrivilege 4776 WerFault.exe Token: SeShutdownPrivilege 4696 svchost.exe Token: SeCreatePagefilePrivilege 4696 svchost.exe Token: SeShutdownPrivilege 4696 svchost.exe Token: SeCreatePagefilePrivilege 4696 svchost.exe Token: SeShutdownPrivilege 4696 svchost.exe Token: SeCreatePagefilePrivilege 4696 svchost.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe Token: SeSecurityPrivilege 1604 TiWorker.exe Token: SeBackupPrivilege 1604 TiWorker.exe Token: SeRestorePrivilege 1604 TiWorker.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exeWerFault.exedescription pid process target process PID 5056 wrote to memory of 4456 5056 rundll32.exe rundll32.exe PID 5056 wrote to memory of 4456 5056 rundll32.exe rundll32.exe PID 5056 wrote to memory of 4456 5056 rundll32.exe rundll32.exe PID 2764 wrote to memory of 4456 2764 WerFault.exe rundll32.exe PID 2764 wrote to memory of 4456 2764 WerFault.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d02798629a25f74b9a5340cd3a5b1070cecbdffe04332c76c20f31357440b5fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d02798629a25f74b9a5340cd3a5b1070cecbdffe04332c76c20f31357440b5fd.dll,#12⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 5443⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4456 -ip 44561⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1604