Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe
Resource
win7-20220812-en
General
-
Target
381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe
-
Size
747KB
-
MD5
060f15001381480ff0954366c3315d87
-
SHA1
a144e3a202b4ecf716178af0b971897a40b11269
-
SHA256
381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac
-
SHA512
4012de7fc5dcb2bcda3eabb231377aead7ad40c849f107223a9d65d7d6a9b06f8af257eebec550b0a649d593d54b097908145857d5e11564368cd50714451287
-
SSDEEP
12288:qfSZhRaUrFaMNzJctSh9/NoNg9feDrSadzTvVEtyL0KN817T6RfJYGxLCf5TBLQM:3ZhRaUhaQplSg9eDrddzpwyYKN817T6m
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4708 set thread context of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 3504 set thread context of 4616 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 3420 4616 WerFault.exe 89 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeSecurityPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeTakeOwnershipPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeLoadDriverPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeSystemProfilePrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeSystemtimePrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeProfSingleProcessPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeIncBasePriorityPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeCreatePagefilePrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeBackupPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeRestorePrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeShutdownPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeDebugPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeSystemEnvironmentPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeChangeNotifyPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeRemoteShutdownPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeUndockPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeManageVolumePrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeImpersonatePrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: SeCreateGlobalPrivilege 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: 33 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: 34 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: 35 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe Token: 36 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 4708 wrote to memory of 3504 4708 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 85 PID 3504 wrote to memory of 4616 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 89 PID 3504 wrote to memory of 4616 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 89 PID 3504 wrote to memory of 4616 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 89 PID 3504 wrote to memory of 4616 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 89 PID 3504 wrote to memory of 4616 3504 381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe"C:\Users\Admin\AppData\Local\Temp\381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exeC:\Users\Admin\AppData\Local\Temp\381eae7a558d8599f67b1dca1131fa92d500d14e4b56b90f0e6ff656984471ac.exe2⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 3524⤵
- Program crash
PID:3420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4616 -ip 46161⤵PID:2316