Analysis
-
max time kernel
140s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-05-2023 10:07
Behavioral task
behavioral1
Sample
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
Resource
win10v2004-20230220-en
General
-
Target
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
-
Size
789KB
-
MD5
655d4aefecebf4197c5be675b8e46659
-
SHA1
780b05842c95f5ecb1d0ae8cb4202220eb9e4142
-
SHA256
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad
-
SHA512
e5339b161099ad095f63eaf88a25a550e6a0e0e3baf0d96302517b9bc77a59fd2b8a90dd39c92ae1e2ed8de9e774214d099b68060d1667d58846693d6d8c819a
-
SSDEEP
12288:VuXz+6yYrqyTh+jOsxgRISEt/9/RooArydEQNZZ9kuHV33nPXjpVtNxJq8L:M+6rhqNugiMdBHVHPzzJL
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2004 1220 WerFault.exe 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe -
Modifies registry class 10 IoCs
Processes:
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC} 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID\ = "654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler\ = "this is my ebook" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler\Clsid 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler\Clsid\ = "{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ = "this is my ebook" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exedescription pid process target process PID 1220 wrote to memory of 2004 1220 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe WerFault.exe PID 1220 wrote to memory of 2004 1220 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe WerFault.exe PID 1220 wrote to memory of 2004 1220 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe WerFault.exe PID 1220 wrote to memory of 2004 1220 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe"C:\Users\Admin\AppData\Local\Temp\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 3922⤵
- Program crash
PID:2004