Analysis
-
max time kernel
1606s -
max time network
1430s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
25-02-2022 03:09
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
a.exe
-
Size
1.5MB
-
MD5
7264b8eb7076a2b78617e0e38058d0f3
-
SHA1
03cd675e664f434773d9c069c0a59b428cd1bedc
-
SHA256
728418b13e48aacdb925ae8b891e0f0a35ec8482c92f65fefe8bd4ab890224d2
-
SHA512
47f1d0fef411ab7fcc587b1fad1b143c69dc0723ff58f7d0d8f9d29efe2bcc8ca016b6536996a2a3bc7af2b49a378c68d03876962d5a84eea01c0f119a0643e1
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1196 created 820 1196 WerFault.exe vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DelhiBrosBP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a.exe" a.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a.exedescription pid process target process PID 3692 set thread context of 820 3692 a.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1464 820 WerFault.exe vbc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
a.exepid process 3692 a.exe 3692 a.exe 3692 a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
a.exepid process 3692 a.exe 3692 a.exe 3692 a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a.exeWerFault.exedescription pid process target process PID 3692 wrote to memory of 820 3692 a.exe vbc.exe PID 3692 wrote to memory of 820 3692 a.exe vbc.exe PID 3692 wrote to memory of 820 3692 a.exe vbc.exe PID 3692 wrote to memory of 820 3692 a.exe vbc.exe PID 1196 wrote to memory of 820 1196 WerFault.exe vbc.exe PID 1196 wrote to memory of 820 1196 WerFault.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 803⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 820 -ip 8201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory