Analysis
-
max time kernel
123s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
23-02-2022 18:54
Static task
static1
Behavioral task
behavioral1
Sample
New_Active_Pass_1234.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
New_Active_Pass_1234.exe
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
New_Active_Pass_1234.exe
-
Size
5.1MB
-
MD5
33ba1406d282fb20e5ddc34011e430c6
-
SHA1
8f92e1ebeb8508bb01464f1f7badc8d7a36b6706
-
SHA256
f906f99d0cea3668af8e8b4d16671c2365d8e5190943114b8a3a136801914d9b
-
SHA512
6e9508c675a023b358e3728ec0f74acd140af793d28b4737b18098d37310879fb26cc54d47a1d0740301dc41c641ae56e1e053b165a00ef3844cf0631051179f
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 3160 created 2880 3160 WerFault.exe New_Active_Pass_1234.exe PID 3512 created 2880 3512 WerFault.exe New_Active_Pass_1234.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2240 2880 WerFault.exe New_Active_Pass_1234.exe 2644 2880 WerFault.exe New_Active_Pass_1234.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exeWerFault.exepid process 2240 WerFault.exe 2240 WerFault.exe 2644 WerFault.exe 2644 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 2240 WerFault.exe Token: SeBackupPrivilege 2240 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 3160 wrote to memory of 2880 3160 WerFault.exe New_Active_Pass_1234.exe PID 3160 wrote to memory of 2880 3160 WerFault.exe New_Active_Pass_1234.exe PID 3512 wrote to memory of 2880 3512 WerFault.exe New_Active_Pass_1234.exe PID 3512 wrote to memory of 2880 3512 WerFault.exe New_Active_Pass_1234.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New_Active_Pass_1234.exe"C:\Users\Admin\AppData\Local\Temp\New_Active_Pass_1234.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 4602⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 4682⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2880 -ip 28801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2880 -ip 28801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2880-133-0x0000000000EF0000-0x0000000000F50000-memory.dmpFilesize
384KB