Analysis
-
max time kernel
97s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:59
Static task
static1
Behavioral task
behavioral1
Sample
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe
Resource
win10v2004-20220812-en
General
-
Target
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe
-
Size
71KB
-
MD5
4c66eb06922dbf7c1945d479a3e3d510
-
SHA1
a46950d2d39ba2cd7dc61304fd60008b8aad82f9
-
SHA256
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c
-
SHA512
4aa11c7aaeadfaccf6855de2d69f55a261073fa02bfbb9232386cd42327e90a26c2d8b0a51b82a5c2d58989ee1b0e551c1c3721b8e7969c6392ce012478439d2
-
SSDEEP
1536:wr6XUjM3QURjlLzBPhrqmt1Sa6sXD1eEkphz8qpNni:wTjMBRjlLzBheqU9jNi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exedescription ioc process Key created \REGISTRY\MACHINE\software\WOW6432Node\Microsoft\Windows\CurrentVersion\run a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exedescription ioc process File opened (read-only) \??\X: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\V: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\U: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\N: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\H: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\G: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\J: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\Z: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\W: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\S: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\P: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\M: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\L: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\K: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\E: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\I: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\Y: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\T: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\R: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\Q: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\O: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened (read-only) \??\F: a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exedescription ioc process File opened for modification C:\autorun.inf a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe -
Drops file in Program Files directory 1 IoCs
Processes:
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exedescription ioc process File opened for modification C:\PROGRAM FILES (X86)\ADOBE\ACROBAT READER DC\READER\ACRORD32.EXE a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2572 788 WerFault.exe a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exepid process 788 a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe 788 a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe"C:\Users\Admin\AppData\Local\Temp\a37f1bff9390488d5a74ea7a3f19d8ba1a1156fe69fc34b43965905c91a4cb2c.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 7282⤵
- Program crash
PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 788 -ip 7881⤵PID:4100