Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 04:10
Behavioral task
behavioral1
Sample
03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d.exe
Resource
win10v2004-20220812-en
General
-
Target
03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d.exe
-
Size
132KB
-
MD5
6c18d4e68f9374438bb9592f27346884
-
SHA1
66c42558adc5ac242c6d953796855ce180736cbd
-
SHA256
03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d
-
SHA512
3d40d2a7068cf85a32bc89e04cb08be1cfada9b961d86a3a66fde4a53430739c30981a6d03e1cc0dfa9fb9e934c131a4c942bbfe025474247072f4f788aaef67
-
SSDEEP
3072:vlM4F79IBmU4NlwU5QYee9N0jBBi+uIY/qWaWQ8outjxxxxxx0HH0xxxVgLLxx1Z:31pqkee92jBBiAY/qW3HoSjxxxxxx0Hj
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2440-132-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/2440-135-0x0000000000400000-0x0000000000497000-memory.dmp upx behavioral2/memory/2440-136-0x0000000000400000-0x0000000000497000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ECD2E1DB-244B-424D-858E-364172CB2BED}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{CBF68CE9-F4FC-4592-A9D4-B5D09497E5CF}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4848 2440 WerFault.exe 76 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2440 03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d.exe"C:\Users\Admin\AppData\Local\Temp\03e47c2f1ac9f2e4da8dd5dfe7045c3f187ad6ec2dda7baf628a6dd8c813276d.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 4722⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2440 -ip 24401⤵PID:4216
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4932