Analysis
-
max time kernel
139s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 12:48
Static task
static1
Behavioral task
behavioral1
Sample
82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe
Resource
win10v2004-20220812-en
General
-
Target
82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe
-
Size
796KB
-
MD5
971d463b2829bd001c069c2f26e1b719
-
SHA1
d21a2f0b6ffe96be321cc31314aa297a5bc719da
-
SHA256
82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46
-
SHA512
5e2cf69daaf0b466b4ca174faddb3b0cfbbd28b28a16493fd006b16536c7162b99f5be9b971c57b2e3bbb270c5d32370d2e5351ca2a1a90b2e3940335edf6e65
-
SSDEEP
6144:RVmVEiEpeHtSPfyYrIcL7G6rEZ970dZfZkSWxurIfg/:RV24eHCRtFYZ970dZZkSWgr/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe" 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2848 4328 WerFault.exe 80 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName 82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe"C:\Users\Admin\AppData\Local\Temp\82e9f4991932a5c932463586377e81ec4a03b6898e3743ac4849ce55b3d64d46.exe"1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 3962⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4328 -ip 43281⤵PID:2548