Analysis Overview
SHA256
b8f7abca3b0147fa30f3f0fcf63a1e2426ee4f0b6d07ef2155f02aac87cf41fe
Threat Level: Known bad
The file a259e9b0acf375a8bef8dbc27a8a1996ee02a56889cba07ef58c49185ab033ec.zip was found to be: Known bad.
Malicious Activity Summary
Detect HermeticWizard
Hermeticwiper family
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2022-07-05 07:40
Signatures
Detect HermeticWizard
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Hermeticwiper family
Analysis: behavioral1
Detonation Overview
Submitted
2022-07-05 07:40
Reported
2022-07-05 07:45
Platform
win10v2004-20220414-en
Max time kernel
108s
Max time network
180s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\WerFault.exe |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2296 wrote to memory of 3460 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 2296 wrote to memory of 3460 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
| PID 2296 wrote to memory of 3460 | N/A | C:\Windows\system32\regsvr32.exe | C:\Windows\SysWOW64\regsvr32.exe |
Processes
C:\Windows\system32\regsvr32.exe
regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a259e9b0acf375a8bef8dbc27a8a1996ee02a56889cba07ef58c49185ab033ec.dll
C:\Windows\SysWOW64\regsvr32.exe
/s C:\Users\Admin\AppData\Local\Temp\a259e9b0acf375a8bef8dbc27a8a1996ee02a56889cba07ef58c49185ab033ec.dll
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 460 -p 4104 -ip 4104
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4104 -s 1768
Network
| Country | Destination | Domain | Proto |
| NL | 104.110.191.140:80 | tcp | |
| NL | 104.110.191.140:80 | tcp | |
| US | 13.89.178.26:443 | tcp | |
| NL | 104.110.191.140:80 | tcp | |
| NL | 104.110.191.140:80 | tcp | |
| GB | 92.123.140.25:80 | tcp |
Files
memory/3460-130-0x0000000000000000-mapping.dmp