Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Resource
win10v2004-20220812-en
General
-
Target
9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
-
Size
874KB
-
MD5
b537f30edf3e4ab75733a2d3c9a2eb99
-
SHA1
93ebbcde57c27d17d6fc7e5f066c32efd02272e9
-
SHA256
9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
-
SHA512
2d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
SSDEEP
12288:862u5vuBxvzdQsewncQxiZNK2X4BuZ4S+pev4D9kLEzr8YUrBYqXcsgpXkRmvbEL:8+5vcrdQtwncQAb4BuZvi9BPCcTEe4l
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe -
Loads dropped DLL 7 IoCs
pid Process 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe 576 WerFault.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 576 840 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe Token: SeIncBasePriorityPrivilege 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 1980 wrote to memory of 840 1980 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 29 PID 840 wrote to memory of 576 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 32 PID 840 wrote to memory of 576 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 32 PID 840 wrote to memory of 576 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 32 PID 840 wrote to memory of 576 840 9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe"C:\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe"C:\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe" Track="0001101000"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 13723⤵
- Loads dropped DLL
- Program crash
PID:576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60
-
\Users\Admin\AppData\Local\Temp\9d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8.exe
Filesize874KB
MD5b537f30edf3e4ab75733a2d3c9a2eb99
SHA193ebbcde57c27d17d6fc7e5f066c32efd02272e9
SHA2569d6e498c8a730b7f45c65fe38a08ffd161578aed5f1edae5df5fe032e85c59f8
SHA5122d98dd0f66cb2501bb9b362b1b254d73268e9ac1cb06f9d923dc4d68d1fcac3ebb39dfdcd9a4b773be0d5d4cfb3f1b9fc8b82b229282e8ab04356d78b7417e60