Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Resource
win10v2004-20220812-en
General
-
Target
aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
-
Size
1.3MB
-
MD5
fc8f81b89fbacacda4c60e3fe3ed84f9
-
SHA1
a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
-
SHA256
aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
-
SHA512
05ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
SSDEEP
24576:qK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8:r6JpC3RLy41aibAiCE1Ps0a1LK
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe -
Loads dropped DLL 7 IoCs
pid Process 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe 1740 WerFault.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1348 set thread context of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1740 1672 WerFault.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1348 wrote to memory of 1672 1348 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 28 PID 1672 wrote to memory of 1740 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 31 PID 1672 wrote to memory of 1740 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 31 PID 1672 wrote to memory of 1740 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 31 PID 1672 wrote to memory of 1740 1672 aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe"C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe"C:\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe" Track="0001001000"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 13963⤵
- Loads dropped DLL
- Program crash
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59
-
\Users\Admin\AppData\Local\Temp\aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d.exe
Filesize1.3MB
MD5fc8f81b89fbacacda4c60e3fe3ed84f9
SHA1a343d5df0cfa2d09f1686b43e7faeb7dc3ca1ccc
SHA256aa00348f0b10fad275baf7872f5071e330e0efc37bd08d828180e6cf02186d4d
SHA51205ee66731d3b3aa617425b1f2dce2af90339ccb8cd4cb8c08ad42b0ad4a80ba3e073ce49d7f6043cc261957b329b7a3546254d827b948e285c695bb0a37c2e59