Analysis
-
max time kernel
108s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2023, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
WerFault.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
WerFault.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
faultrep.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
faultrep.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
file.xls
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
file.xls
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
recent inventory& our specialties.lnk
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
recent inventory& our specialties.lnk
Resource
win10v2004-20221111-en
General
-
Target
WerFault.exe
-
Size
557KB
-
MD5
fd27d9f6d02763bde32511b5df7ff7a0
-
SHA1
ee79105026360209a5466db878e50f84cd6fc0f0
-
SHA256
82e7105bc8decc5d75630ad984c12ba67ebf00109aeae739f4733f1e608b3b88
-
SHA512
4d632b69087119e3303145eb0fa9339eb799596478b659c6f3fcfa35c6586569fe745355ac29bad7028674d8db4cc9549bdc8d5e9bd1b687caff9b5da3cbd3e2
-
SSDEEP
12288:mIyVelsMij33R6TXrP3Fb1M8WbHOzvR7lfc2HywRhXM:mIdAUB1kHOzvR7lfcyh4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings WerFault.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 808 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4572 WerFault.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE 808 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4572 wrote to memory of 808 4572 WerFault.exe 80 PID 4572 wrote to memory of 808 4572 WerFault.exe 80 PID 4572 wrote to memory of 808 4572 WerFault.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\WerFault.exe"C:\Users\Admin\AppData\Local\Temp\WerFault.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\file.xls"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:808
-