Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
RF202201002.exe
Resource
win7-20220901-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
RF202201002.exe
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
RF202201002.exe
-
Size
741KB
-
MD5
4e6f0d386462dba844d2842442430b68
-
SHA1
32ad4cfd2bbf88aa057e7928ee11c0ab76a6ef0e
-
SHA256
eb7562547f5d2ac7f6da17ec4c1e0195715ed4309ef43d5d0cc49ec073207ff5
-
SHA512
883a094fd663912c69c6f2b96328add6ae064ceb0c82bb28e4e8f9212ce5534816312b99e05423d9baea18a781704d00c970b5be7af2490bd8c2b0243e992e67
-
SSDEEP
12288:VslvVxN02iN9ADqjJ5npUCA9wN05ZoMzr4Rrd23oUPrVsqAKC:qT01bjrpVTN046swoUPBNA
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4784 4152 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RF202201002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RF202201002.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe 4152 RF202201002.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 RF202201002.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RF202201002.exe"C:\Users\Admin\AppData\Local\Temp\RF202201002.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 22042⤵
- Program crash
PID:4784
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4152 -ip 41521⤵PID:3496