Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe
Resource
win10v2004-20220812-en
General
-
Target
ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe
-
Size
649KB
-
MD5
02334b413f9945f3cdda28c18e488054
-
SHA1
74bc346e3ec89bd84c78c0d5854fddebe0ddf89f
-
SHA256
ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e
-
SHA512
4a6f5377f98642e3a8c96caa204bea6ae917481418ca6a5591c3e73fbe52dd21d19f74790ce57da83dc53c0297d98e201b02d8270c73b5b93dff67936ee3eafb
-
SSDEEP
6144:sO6X1q+mpwBufGTa3tCqZiPY5Y2gL4EYLJ2rk7ijZUrbIckrVWLzAI+IG6lG9EF0:YXjaXfHviPQY2gJWWjZyBkwcf6nFul/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AS2014 = "C:\\ProgramData\\sRVaWXil\\sRVaWXil.exe" ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe -
Program crash 11 IoCs
pid pid_target Process procid_target 1340 2868 WerFault.exe 79 2416 2868 WerFault.exe 79 488 2868 WerFault.exe 79 332 2868 WerFault.exe 79 2180 2868 WerFault.exe 79 4536 2868 WerFault.exe 79 1416 2868 WerFault.exe 79 2176 2868 WerFault.exe 79 4972 2868 WerFault.exe 79 1808 2868 WerFault.exe 79 4964 2868 WerFault.exe 79 -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe"C:\Users\Admin\AppData\Local\Temp\ad1cab15d1df22d7ad9567d23c7ebbb448658096162b6295384def9cd7f7068e.exe"1⤵
- Adds Run key to start application
- Checks SCSI registry key(s)
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 6202⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 6522⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 8162⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 8162⤵
- Program crash
PID:332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 8042⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 9482⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 10322⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 11442⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 13642⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 13042⤵
- Program crash
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 14162⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2868 -ip 28681⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2868 -ip 28681⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2868 -ip 28681⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2868 -ip 28681⤵PID:924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2868 -ip 28681⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2868 -ip 28681⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2868 -ip 28681⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2868 -ip 28681⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2868 -ip 28681⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2868 -ip 28681⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2868 -ip 28681⤵PID:2932