Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe
Resource
win10v2004-20220812-en
General
-
Target
d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe
-
Size
59KB
-
MD5
e14d42e9d43e447b44ec3a01718e1a25
-
SHA1
cfaf7af4fb0e69df763ca0cc84cc17698a5adb96
-
SHA256
d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b
-
SHA512
bcb26bfaf1c1d46e3220c2fb7df3c58c8b345d13f038d2d870f0f17783961aae2f834a305b54f816282f2ee07519c0b3797a84cc4c2b77b4947bf18eab336d14
-
SSDEEP
1536:zOjIqZQiLf45OLj6evXVCTBW627GwIymKpWdLTuaN:CMqZ1LA5OnS8GnTdLTua
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe File created \??\c:\windows\SysWOW64\d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.dll d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{70D82567-5E8B-48EB-8548-F40F570EFCFE}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0B4EF43B-5EC4-428B-ADA2-244EF7AD245D}.catalogItem svchost.exe File created \??\c:\windows\SysWOW64\d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2980 2228 WerFault.exe 74 940 2228 WerFault.exe 74 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2228 d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe 2228 d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe"C:\Users\Admin\AppData\Local\Temp\d3b276ea36f352e4dce53689de4d4a28056973f8d0c30a20c75c358d421db58b.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 4682⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 4682⤵
- Program crash
PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2228 -ip 22281⤵PID:2408
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2228 -ip 22281⤵PID:2404