Analysis
-
max time kernel
228s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
28-02-2022 15:51
Static task
static1
Behavioral task
behavioral1
Sample
98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163.dll
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163.dll
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163.dll
Resource
win10v2004-en-20220113
General
-
Target
98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163.dll
-
Size
81KB
-
MD5
5a9d40558e6c795e24935b9040354e6a
-
SHA1
52b07a8c5d3163299a0844d802258ccc62b16dff
-
SHA256
98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163
-
SHA512
67e43c79f5fdc53fb694d4f186d0766cbd9358416a843d91680af6513485430c82970ae6d5a53b375d984bae93ebd8177e45470e9b6fe0943505010e18f4c4ac
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 1924 created 1468 1924 WerFault.exe 79 -
Program crash 1 IoCs
pid pid_target Process procid_target 1300 1468 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1300 WerFault.exe 1300 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1300 WerFault.exe Token: SeBackupPrivilege 1300 WerFault.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1468 1392 rundll32.exe 79 PID 1392 wrote to memory of 1468 1392 rundll32.exe 79 PID 1392 wrote to memory of 1468 1392 rundll32.exe 79 PID 1924 wrote to memory of 1468 1924 WerFault.exe 79 PID 1924 wrote to memory of 1468 1924 WerFault.exe 79
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\98d17731ce6eba2772c94fbe5b740cbd83b5d5b0da6809c265ff3dc0da391163.dll,#12⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 6003⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1468 -ip 14681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:1924