Analysis
-
max time kernel
187s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe
Resource
win10v2004-20221111-en
General
-
Target
96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe
-
Size
815KB
-
MD5
a751150ba316f4b1c71d01fcd6ab6713
-
SHA1
62a0ab3fe0d15c35a4fa69a3a479c853af954281
-
SHA256
96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1
-
SHA512
616b0525c01a9ce00bea6df6b6ce497957093938b775941eb3d0d47934e6f577458331cc158a031ad1aa62c9e5795e1f2873883085693e2efe0c3b308528a18b
-
SSDEEP
24576:WLm1YdtHcFXA/2/qAViqfW5VYeae5CumH7zK:7Ydt8FQ/2tIzBeb
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2548-133-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral2/memory/2548-135-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral2/memory/2548-136-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral2/memory/2548-137-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral2/memory/2548-138-0x0000000000400000-0x000000000063D000-memory.dmp upx behavioral2/memory/2548-139-0x0000000000400000-0x000000000063D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NetworkChecker = "C:\\Users\\Admin\\AppData\\Local\\Temp\\96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe" 96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1696 2548 WerFault.exe 80 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main 96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DefaultCompressedRecord = df80f97f7351b58d18b44a5a7bd90b0b2d83253856c812d4989033e43afabd71481a184496e223aa01db89c3c19fb32b1a9cd7132437947a75d2bb216a636d6a8f188603b58ee165128d8ac3d4822d1b6a08df1264677f902a6376e1ac4c199f69227965afedbf 96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\RecordModifiedMax = "DDjSuy9Z2tSYX+bFg55colfs8P9GW4dOqmCY5gEWmEVcxXZTA7AYLPA6wPIEO1HvsA==" 96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe Set value (data) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FlagsModifiedValid = 0000000000000000 96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe"C:\Users\Admin\AppData\Local\Temp\96911adb0d7235404607cb26fdc8fff30f561e221484bc946d4d739c7ea0b7c1.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 9122⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2548 -ip 25481⤵PID:4936