Analysis
-
max time kernel
46s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 10:22
Behavioral task
behavioral1
Sample
bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe
Resource
win10v2004-20220812-en
General
-
Target
bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe
-
Size
5.5MB
-
MD5
009383b6728d9a6311531efad52d2aba
-
SHA1
f9b79f0f312db9305d5ec4bb3eb90a2d9a1910d1
-
SHA256
bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23
-
SHA512
f1798c0ef4c79f3ea1a70f81e366d9bfd6c11e371e2550b7f49b3e817fdb58695e0a64db6f4cf1ee3cf523dc8712f8e6afb5ce0b759dcdf937cd3f37daff85fb
-
SSDEEP
98304:E/KDFYhmvH5rqxtRInvZoTELqsuL06N25uiscdW1TqKx6Wfp8MTwoQxsBuxzRPi:E/KDFYhC5WsvZOiqvN25dpY1TloWfp83
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 892 1572 WerFault.exe 26 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 892 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 27 PID 1572 wrote to memory of 892 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 27 PID 1572 wrote to memory of 892 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 27 PID 1572 wrote to memory of 892 1572 bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe"C:\Users\Admin\AppData\Local\Temp\bafa16d20775b94fdf5553a568d1ab3eded2983aab245ca1334374ba86e8db23.exe"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 7762⤵
- Program crash
PID:892
-