Analysis

  • max time kernel
    43s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 13:31

General

  • Target

    aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

  • Size

    1.3MB

  • MD5

    fc8f81b89fbacacda4c60e3fe3ed84f9

  • SHA1

    a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

  • SHA256

    aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

  • SHA512

    05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

  • SSDEEP

    24576:qK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8:r6JpC3RLy41aibAiCE1Ps0a1LK

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 7 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
    "C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe"
    1⤵
    • Checks BIOS information in registry
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
      "C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe" Track="0001001000"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 1396
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1740

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • \Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe

          Filesize

          1.3MB

          MD5

          fc8f81b89fbacacda4c60e3fe3ed84f9

          SHA1

          a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc

          SHA256

          aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d

          SHA512

          05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59

        • memory/1348-70-0x0000000000400000-0x0000000000674000-memory.dmp

          Filesize

          2.5MB

        • memory/1348-65-0x0000000000400000-0x0000000000674000-memory.dmp

          Filesize

          2.5MB

        • memory/1348-67-0x0000000002870000-0x0000000002AE4000-memory.dmp

          Filesize

          2.5MB

        • memory/1672-63-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-71-0x0000000075601000-0x0000000075603000-memory.dmp

          Filesize

          8KB

        • memory/1672-72-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-73-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-66-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-54-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-61-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-59-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-57-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-55-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB

        • memory/1672-82-0x0000000000400000-0x00000000004F6000-memory.dmp

          Filesize

          984KB