Analysis
-
max time kernel
151s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-02-2023 20:14
Behavioral task
behavioral1
Sample
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe
Resource
win10v2004-20230220-en
General
-
Target
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe
-
Size
5.2MB
-
MD5
1733efc4bd3e51b8797480e0b987471f
-
SHA1
17d91dd5d608174201e785b1d2dff09826b43dca
-
SHA256
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340
-
SHA512
7c8161ca1321364dcb0a58c83c1049ecb2b538e30a4eeddbd3dc28a0e7280b70d30ed6b7749bfb4598bc4dd35d369a87bf801f71b0ba1e5638b8d6485019965a
-
SSDEEP
98304:Eui/NixcFWa+792LGPiv5W8u1xfFMST/zcBIBbXIgo/xMMm:ji/pFz+RcG4Vu1xfm6/IGBbXsM
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1296 944 WerFault.exe c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exepid process 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exedescription pid process target process PID 944 wrote to memory of 1296 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe WerFault.exe PID 944 wrote to memory of 1296 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe WerFault.exe PID 944 wrote to memory of 1296 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe WerFault.exe PID 944 wrote to memory of 1296 944 c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe"C:\Users\Admin\AppData\Local\Temp\c5bc5974c98bc092710dd9422385a78b881931e0955693ee0035081dc5d08340.exe"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 9002⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\config.iniFilesize
41B
MD596b2b4208e461fae06b9bdc0a45a9b50
SHA1c61c266e301306f338999028de9400cda4f80eec
SHA256011b7379180d5cfdf51753b30460df5be855ae879eba60f17d462b23efb3d20f
SHA51244ef2e3cc12669a89f73bd5c96cc7f938e6674709ddf9c4fcc143af4846d14f4d5053f0f08ef0f69cc04c2ddf74d572c71e984d37613ee564e5d6d087cf15412
-
memory/944-66-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/944-56-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-57-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-58-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-59-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-55-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-54-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-76-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-83-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-84-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-85-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/944-87-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB
-
memory/944-89-0x0000000000400000-0x0000000001636000-memory.dmpFilesize
18.2MB