Analysis
-
max time kernel
75s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 11:35
Static task
static1
Behavioral task
behavioral1
Sample
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe
Resource
win10v2004-20220812-en
General
-
Target
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe
-
Size
2.0MB
-
MD5
39fce4ee5499bb517b397573898e1af9
-
SHA1
074eed3d2bbc3559b76069770abb5f3c730ee3d2
-
SHA256
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da
-
SHA512
3a07e26bb09cc3df320f2bb6a419d022e71a6bda2a3f9a33efdc9b83aec00317054e191411bc99883a308640f69e0a0beee31f2747446967553c35129e27932f
-
SSDEEP
24576:W2KrlpxUxHoFhp/S1AWmQO18C2BwfTs6T22CKRJqNE4u6FOcnDsHspz8vlX9xRB0:WTDxB8CWwfTX3clnBowjh7
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exedescription ioc process File opened (read-only) \??\Q: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\T: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\W: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\Y: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\J: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\K: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\O: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\P: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\Z: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\E: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\L: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\N: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\V: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\H: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\M: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\R: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\U: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\X: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\F: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\G: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\I: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe File opened (read-only) \??\S: 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3324 4760 WerFault.exe tcpsvcs.exe 2712 4760 WerFault.exe tcpsvcs.exe 2120 3324 WerFault.exe WerFault.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBIOSDate 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exepid process 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
tcpsvcs.exepid process 4760 tcpsvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
tcpsvcs.exepid process 4760 tcpsvcs.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.execmd.exenet.exetcpsvcs.execmd.exenet.exedescription pid process target process PID 1616 wrote to memory of 3724 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe cmd.exe PID 1616 wrote to memory of 3724 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe cmd.exe PID 1616 wrote to memory of 3724 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe cmd.exe PID 3724 wrote to memory of 4784 3724 cmd.exe net.exe PID 3724 wrote to memory of 4784 3724 cmd.exe net.exe PID 3724 wrote to memory of 4784 3724 cmd.exe net.exe PID 4784 wrote to memory of 4868 4784 net.exe net1.exe PID 4784 wrote to memory of 4868 4784 net.exe net1.exe PID 4784 wrote to memory of 4868 4784 net.exe net1.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 1616 wrote to memory of 4760 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe tcpsvcs.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 4760 wrote to memory of 3324 4760 tcpsvcs.exe WerFault.exe PID 1616 wrote to memory of 5092 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe cmd.exe PID 1616 wrote to memory of 5092 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe cmd.exe PID 1616 wrote to memory of 5092 1616 795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe cmd.exe PID 5092 wrote to memory of 1984 5092 cmd.exe net.exe PID 5092 wrote to memory of 1984 5092 cmd.exe net.exe PID 5092 wrote to memory of 1984 5092 cmd.exe net.exe PID 1984 wrote to memory of 3440 1984 net.exe net1.exe PID 1984 wrote to memory of 3440 1984 net.exe net1.exe PID 1984 wrote to memory of 3440 1984 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe"C:\Users\Admin\AppData\Local\Temp\795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Enumerates connected drives
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵PID:4868
-
C:\Windows\SysWOW64\tcpsvcs.exe"C:\Users\Admin\AppData\Local\Temp\795637a92431574d95290ca7109587149309b061a952ff2b153da0fda343e6da2.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10443⤵
- Program crash
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 10204⤵
- Program crash
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10443⤵
- Program crash
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net start Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\net.exenet start Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Spooler4⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4760 -ip 47601⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3324 -ip 33241⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3324 -ip 33241⤵PID:4252
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2540