Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe
Resource
win10v2004-20220812-en
General
-
Target
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe
-
Size
4.0MB
-
MD5
ffb8f2b184a583a281e42b7ceeaacbc1
-
SHA1
848f8cb912fd833a08481f571146022fb73eb80e
-
SHA256
a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218
-
SHA512
5342fae478ccac6d933894905c5b068bd2ac0ac97dad5afb88831b31fd58bc9237388149de0439489a8913224719cb038d5c929fa098581cc7da981fd0a4a79b
-
SSDEEP
98304:Xoe0/H/vLq+crSY8bBXKJ01peq1cZqD+cngaSHQ3rafb:XhAHLq+cJ8NXKJApeq1c8DJgaBi
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4300 5088 WerFault.exe 80 4944 4848 WerFault.exe 84 424 4848 WerFault.exe 84 -
Modifies registry class 4 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649}\0 = 709c3ee7dc721bb5d28b69ee98b64d0c3f026a5b1f a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649}\Version a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649}\Version\ = "1.0" a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{32A04561-77C1-13D1-B2E4-0060975B8649} a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4848 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe Token: SeIncBasePriorityPrivilege 4848 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4848 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84 PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84 PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84 PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84 PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84 PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84 PID 5088 wrote to memory of 4848 5088 a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 4842⤵
- Program crash
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"C:\Users\Admin\AppData\Local\Temp\a13b90111cf5054e290a42ac307d8fac2113cd5e597f7b9f84051b2d88986218.exe"2⤵
- Checks BIOS information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 5443⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 5523⤵
- Program crash
PID:424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5088 -ip 50881⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4848 -ip 48481⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4848 -ip 48481⤵PID:1432