Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe
Resource
win10v2004-20220812-en
General
-
Target
49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe
-
Size
782KB
-
MD5
970cd2e887d282ae9471511420794e17
-
SHA1
4d0a5b02e4eff92a745e4ada4311c085cce710d1
-
SHA256
49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719
-
SHA512
f385930f8c9c805f2cb07960fa129ff2642ec98771b991ac6e03dbcd51f6537e50a7e75d34bc14212528c650f6b4042f0c13e1f415819fe70ec1a8164f674d14
-
SSDEEP
12288:b2KZ0DaRQKgp5rwDuIxIe13w3vsHVuM9hQa8IRwdoMCxgnmhUKdQh:b9SG7nme1p81a8IYoMCWmh
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\g3Ur6a39\\g3Ur6a39.exe" 49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe -
Program crash 10 IoCs
pid pid_target Process procid_target 4220 3272 WerFault.exe 79 5104 3272 WerFault.exe 79 4272 3272 WerFault.exe 79 3840 3272 WerFault.exe 79 3364 3272 WerFault.exe 79 964 3272 WerFault.exe 79 4784 3272 WerFault.exe 79 4032 3272 WerFault.exe 79 1768 3272 WerFault.exe 79 948 3272 WerFault.exe 79 -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName 49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe"C:\Users\Admin\AppData\Local\Temp\49f20b4b7034f1e7c242342c250da8d75d5a10d0159b86658235afe817122719.exe"1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 8402⤵
- Program crash
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 8402⤵
- Program crash
PID:5104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 8402⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 9802⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 10122⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 11242⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 12082⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 13722⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 10402⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 12362⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3272 -ip 32721⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3272 -ip 32721⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3272 -ip 32721⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3272 -ip 32721⤵PID:4112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3272 -ip 32721⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3272 -ip 32721⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3272 -ip 32721⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3272 -ip 32721⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3272 -ip 32721⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3272 -ip 32721⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3272 -ip 32721⤵PID:3616