Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe
Resource
win10v2004-20220414-en
General
-
Target
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe
-
Size
2.5MB
-
MD5
ec53b5790e673ab0e0229406ae6ca23c
-
SHA1
e0d8e903c3b9690b174550b627bfe63d04b39f60
-
SHA256
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b
-
SHA512
a8a78bc1143ea4df40bf192db846dac6f9aa6c3ee10c6aef24c064ed45c8123953ad9ed8eeb15990a2f6e0e39a6ffc206b7649f5c610c67cb4e48d4efd179c05
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exedescription ioc process File opened for modification \??\PhysicalDrive0 f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1448 3308 WerFault.exe f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Bios f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exepid process 3308 f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exedescription pid process Token: SeIncBasePriorityPrivilege 3308 f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe"C:\Users\Admin\AppData\Local\Temp\f5d4809a4a8314c4a9f2e69ccb358d32c953c3a08dd65900e510b397812fc63b.exe"1⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 7122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3308 -ip 33081⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3308-130-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB
-
memory/3308-131-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB
-
memory/3308-132-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB
-
memory/3308-133-0x0000000005890000-0x0000000007731000-memory.dmpFilesize
30.6MB
-
memory/3308-134-0x0000000000400000-0x000000000089E000-memory.dmpFilesize
4.6MB