Analysis
-
max time kernel
147s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2023 23:42
Static task
static1
Behavioral task
behavioral1
Sample
groot.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
groot.exe
Resource
win10v2004-20230220-en
General
-
Target
groot.exe
-
Size
8KB
-
MD5
fd398c7044a200b5c077864e786897d1
-
SHA1
bfdfb43098dd0e8a797c1eb3c90fff3ea2513306
-
SHA256
f96607784c9e01a30e339eea288d38b6171a1b87ae27c4c2f7925599b133a3bf
-
SHA512
5ab1c0d781bd3b0c6ce1a4d39fd32009818fc0771a479051f4d7d7d50405d75b50255fab3911a183f5abcb6023630c87fc83c79016d4f7575e5d67ec28f8d2a8
-
SSDEEP
96:b3vQYG57oPzLNg4vsO42Jah0lSlGzMfbAsx0HNC+kYn8K3m0kkIHCo9HwCSzNt:TvQ/or5g40OCmKyUbr4oKW9kIHT9HvU
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FB43F02D-67D6-4B40-B802-3349A1BDBF7E}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{7CC8C2D4-5C18-4382-93E0-54C7C5E90787}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4704 1860 WerFault.exe 75 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1860 groot.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\groot.exe"C:\Users\Admin\AppData\Local\Temp\groot.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 10042⤵
- Program crash
PID:4704
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1860 -ip 18601⤵PID:2832