Analysis
-
max time kernel
132s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe
Resource
win10v2004-20220812-en
General
-
Target
b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe
-
Size
68KB
-
MD5
67976e71485fc430244f87a21b8221a0
-
SHA1
9d4b1faa55162da465ce7bff2f77ac2c6d138da0
-
SHA256
b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061
-
SHA512
b7c0f9baff4fe94b23eb7b063057537edba6165ee5f5f4b45dd57ba601e50fabfa6c514f088946035e02e6480763e10da7d59cc07f5f168a2d28068ca3a64871
-
SSDEEP
768:om9muOxFM6AyEAN2V9axm/8vwfc/ttfVXyiHEfvb9h8g:omUAUNPmWD0iHgvb9h8
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4196 2132 WerFault.exe 79 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe Token: SeSecurityPrivilege 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2132 b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe"C:\Users\Admin\AppData\Local\Temp\b2f294535032a4b4ec3af81a1fc398769a160cfad051dec79db67349cf143061.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 7322⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2132 -ip 21321⤵PID:4680