Analysis Overview
SHA256
94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48
Threat Level: Likely malicious
The file 94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48 was found to be: Likely malicious.
Malicious Activity Summary
ASPack v2.12-2.42
Program crash
Modifies Control Panel
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-10-31 22:53
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2022-10-31 22:53
Reported
2022-10-31 22:56
Platform
win10v2004-20220812-en
Max time kernel
91s
Max time network
154s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe |
Modifies Control Panel
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\sShortDate = "yyyy-MM-dd" | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\iDate = "2" | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\sDate = "-" | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | N/A |
Suspicious use of SetWindowsHookEx
Processes
C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe
"C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4680 -ip 4680
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 1156
Network
| Country | Destination | Domain | Proto |
| US | 93.184.220.29:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| US | 8.253.225.254:80 | tcp | |
| US | 8.253.225.254:80 | tcp | |
| US | 209.197.3.8:80 | tcp |
Files
memory/4680-132-0x0000000000400000-0x0000000001907000-memory.dmp
memory/4680-133-0x0000000000400000-0x0000000001907000-memory.dmp
memory/4680-134-0x0000000000400000-0x0000000001907000-memory.dmp
memory/4680-135-0x0000000000400000-0x0000000001907000-memory.dmp
memory/4680-136-0x0000000000400000-0x0000000001907000-memory.dmp
memory/4680-137-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-138-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-139-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-140-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-141-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-142-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-143-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-144-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-145-0x0000000003770000-0x00000000038B0000-memory.dmp
memory/4680-146-0x0000000000400000-0x0000000001907000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2022-10-31 22:53
Reported
2022-10-31 22:56
Platform
win7-20220901-en
Max time kernel
45s
Max time network
50s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe |
Modifies Control Panel
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\sDate = "-" | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\sShortDate = "yyyy-MM-dd" | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\iDate = "2" | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | N/A |
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1600 wrote to memory of 688 | N/A | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1600 wrote to memory of 688 | N/A | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1600 wrote to memory of 688 | N/A | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | C:\Windows\SysWOW64\WerFault.exe |
| PID 1600 wrote to memory of 688 | N/A | C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe | C:\Windows\SysWOW64\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe
"C:\Users\Admin\AppData\Local\Temp\94f0e91b85ec1a44ea3fa3ea64f1c961b4a9fe3188ab242dba151582453dfd48.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 628
Network
Files
memory/1600-54-0x00000000752B1000-0x00000000752B3000-memory.dmp
memory/1600-55-0x0000000000400000-0x0000000001907000-memory.dmp
memory/1600-56-0x0000000000400000-0x0000000001907000-memory.dmp
memory/1600-57-0x0000000000400000-0x0000000001907000-memory.dmp
memory/1600-58-0x0000000000400000-0x0000000001907000-memory.dmp
memory/1600-59-0x0000000000400000-0x0000000001907000-memory.dmp
memory/1600-62-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-60-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-61-0x0000000000400000-0x0000000001907000-memory.dmp
memory/1600-68-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-69-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-67-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-66-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-65-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-64-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/1600-63-0x0000000003360000-0x00000000034A0000-memory.dmp
memory/688-70-0x0000000000000000-mapping.dmp
memory/1600-71-0x0000000000400000-0x0000000001907000-memory.dmp