Analysis

  • max time kernel
    108s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2023, 13:10

General

  • Target

    WerFault.exe

  • Size

    557KB

  • MD5

    fd27d9f6d02763bde32511b5df7ff7a0

  • SHA1

    ee79105026360209a5466db878e50f84cd6fc0f0

  • SHA256

    82e7105bc8decc5d75630ad984c12ba67ebf00109aeae739f4733f1e608b3b88

  • SHA512

    4d632b69087119e3303145eb0fa9339eb799596478b659c6f3fcfa35c6586569fe745355ac29bad7028674d8db4cc9549bdc8d5e9bd1b687caff9b5da3cbd3e2

  • SSDEEP

    12288:mIyVelsMij33R6TXrP3Fb1M8WbHOzvR7lfc2HywRhXM:mIdAUB1kHOzvR7lfcyh4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WerFault.exe
    "C:\Users\Admin\AppData\Local\Temp\WerFault.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\file.xls"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/808-153-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-149-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-150-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-151-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-152-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-192-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-191-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-190-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-189-0x00007FFCEE4B0000-0x00007FFCEE4C0000-memory.dmp

    Filesize

    64KB

  • memory/808-180-0x00007FFCEC080000-0x00007FFCEC090000-memory.dmp

    Filesize

    64KB

  • memory/808-179-0x00007FFCEC080000-0x00007FFCEC090000-memory.dmp

    Filesize

    64KB

  • memory/4572-162-0x000001B1CAA31000-0x000001B1CAA38000-memory.dmp

    Filesize

    28KB

  • memory/4572-168-0x000001B1CAA91000-0x000001B1CAA96000-memory.dmp

    Filesize

    20KB

  • memory/4572-142-0x000001B1C91F1000-0x000001B1C9217000-memory.dmp

    Filesize

    152KB

  • memory/4572-143-0x000001B1CA871000-0x000001B1CAA0B000-memory.dmp

    Filesize

    1.6MB

  • memory/4572-144-0x000001B1C9221000-0x000001B1C9241000-memory.dmp

    Filesize

    128KB

  • memory/4572-139-0x000001B1C9DD0000-0x000001B1C9E57000-memory.dmp

    Filesize

    540KB

  • memory/4572-145-0x000001B1C95A1000-0x000001B1C95AD000-memory.dmp

    Filesize

    48KB

  • memory/4572-146-0x000001B1CA3A1000-0x000001B1CA3B0000-memory.dmp

    Filesize

    60KB

  • memory/4572-148-0x000001B1CA3F1000-0x000001B1CA3F7000-memory.dmp

    Filesize

    24KB

  • memory/4572-147-0x000001B1CA3B1000-0x000001B1CA3DD000-memory.dmp

    Filesize

    176KB

  • memory/4572-154-0x000001B1CA401000-0x000001B1CA41F000-memory.dmp

    Filesize

    120KB

  • memory/4572-155-0x000001B1CA421000-0x000001B1CA426000-memory.dmp

    Filesize

    20KB

  • memory/4572-156-0x000001B1CA431000-0x000001B1CA436000-memory.dmp

    Filesize

    20KB

  • memory/4572-158-0x000001B1CA451000-0x000001B1CA456000-memory.dmp

    Filesize

    20KB

  • memory/4572-157-0x000001B1CA441000-0x000001B1CA446000-memory.dmp

    Filesize

    20KB

  • memory/4572-159-0x000001B1CA461000-0x000001B1CA466000-memory.dmp

    Filesize

    20KB

  • memory/4572-161-0x000001B1CAA21000-0x000001B1CAA27000-memory.dmp

    Filesize

    24KB

  • memory/4572-160-0x000001B1CAA11000-0x000001B1CAA16000-memory.dmp

    Filesize

    20KB

  • memory/4572-140-0x000001B1CD770000-0x000001B1CDAD9000-memory.dmp

    Filesize

    3.4MB

  • memory/4572-163-0x000001B1CAA41000-0x000001B1CAA48000-memory.dmp

    Filesize

    28KB

  • memory/4572-164-0x000001B1CAA51000-0x000001B1CAA57000-memory.dmp

    Filesize

    24KB

  • memory/4572-165-0x000001B1CAA61000-0x000001B1CAA66000-memory.dmp

    Filesize

    20KB

  • memory/4572-166-0x000001B1CAA71000-0x000001B1CAA76000-memory.dmp

    Filesize

    20KB

  • memory/4572-141-0x000001B1CD770000-0x000001B1CDAD9000-memory.dmp

    Filesize

    3.4MB

  • memory/4572-167-0x000001B1CAA81000-0x000001B1CAA86000-memory.dmp

    Filesize

    20KB

  • memory/4572-169-0x000001B1CAAA1000-0x000001B1CAAA6000-memory.dmp

    Filesize

    20KB

  • memory/4572-170-0x000001B1CAAB1000-0x000001B1CAAB7000-memory.dmp

    Filesize

    24KB

  • memory/4572-171-0x000001B1CAAC1000-0x000001B1CAACB000-memory.dmp

    Filesize

    40KB

  • memory/4572-172-0x000001B1CAAD1000-0x000001B1CAAD7000-memory.dmp

    Filesize

    24KB

  • memory/4572-173-0x000001B1CAAE1000-0x000001B1CAAE9000-memory.dmp

    Filesize

    32KB

  • memory/4572-175-0x000001B1CAB01000-0x000001B1CAB06000-memory.dmp

    Filesize

    20KB

  • memory/4572-174-0x000001B1CAAF1000-0x000001B1CAAF7000-memory.dmp

    Filesize

    24KB

  • memory/4572-176-0x000001B1CAC91000-0x000001B1CACF9000-memory.dmp

    Filesize

    416KB

  • memory/4572-177-0x000001B1CAB11000-0x000001B1CAB2A000-memory.dmp

    Filesize

    100KB

  • memory/4572-178-0x000001B1CAD01000-0x000001B1CAD11000-memory.dmp

    Filesize

    64KB

  • memory/4572-138-0x000001B1C9B30000-0x000001B1C9DC6000-memory.dmp

    Filesize

    2.6MB

  • memory/4572-136-0x000001B1C8FE0000-0x000001B1C907D000-memory.dmp

    Filesize

    628KB

  • memory/4572-181-0x000001B1C95C0000-0x000001B1C9B26000-memory.dmp

    Filesize

    5.4MB

  • memory/4572-182-0x000001B1C8FE0000-0x000001B1C907D000-memory.dmp

    Filesize

    628KB

  • memory/4572-183-0x000001B1C9B30000-0x000001B1C9DC6000-memory.dmp

    Filesize

    2.6MB

  • memory/4572-184-0x000001B1CD770000-0x000001B1CDAD9000-memory.dmp

    Filesize

    3.4MB

  • memory/4572-185-0x000001B1C9221000-0x000001B1C9241000-memory.dmp

    Filesize

    128KB

  • memory/4572-186-0x000001B1CA3A1000-0x000001B1CA3B0000-memory.dmp

    Filesize

    60KB

  • memory/4572-187-0x000001B1CA3B1000-0x000001B1CA3DD000-memory.dmp

    Filesize

    176KB

  • memory/4572-135-0x000001B1C95C0000-0x000001B1C9B26000-memory.dmp

    Filesize

    5.4MB

  • memory/4572-134-0x000001B1C9DD0000-0x000001B1C9E57000-memory.dmp

    Filesize

    540KB

  • memory/4572-133-0x000001B1C9B30000-0x000001B1C9DC6000-memory.dmp

    Filesize

    2.6MB

  • memory/4572-132-0x000001B1C8FE0000-0x000001B1C907D000-memory.dmp

    Filesize

    628KB