Analysis
-
max time kernel
226s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-06-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
70b278b5e01f7cc409a112892e8f2ff243afa0d0815d060e31a813ba24316d37.bin.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
70b278b5e01f7cc409a112892e8f2ff243afa0d0815d060e31a813ba24316d37.bin.exe
Resource
win10v2004-20220414-en
General
-
Target
70b278b5e01f7cc409a112892e8f2ff243afa0d0815d060e31a813ba24316d37.bin.exe
-
Size
413KB
-
MD5
7540c893f18b33b0e4d6a1fba417ab0e
-
SHA1
5c7746c6f8f13eb18ecd41ea3ecd4b5de51e3519
-
SHA256
70b278b5e01f7cc409a112892e8f2ff243afa0d0815d060e31a813ba24316d37
-
SHA512
e9d8b20516b8083df1e35ac0be4fd5491a0cf450bf152f8c8d0b9776d3536c1f0249b3d8af09ca575a734d0552ea90e62410b1cb24a1f423cc72b72f9878e473
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 4152 4628 WerFault.exe 79 432 4628 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1688 WINWORD.EXE 1688 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE 1688 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\70b278b5e01f7cc409a112892e8f2ff243afa0d0815d060e31a813ba24316d37.bin.exe"C:\Users\Admin\AppData\Local\Temp\70b278b5e01f7cc409a112892e8f2ff243afa0d0815d060e31a813ba24316d37.bin.exe"1⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 3202⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 1642⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4628 -ip 46281⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4628 -ip 46281⤵PID:4384
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\StopBlock.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1688