Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 10:07
Behavioral task
behavioral1
Sample
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
Resource
win10v2004-20230220-en
General
-
Target
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
-
Size
789KB
-
MD5
655d4aefecebf4197c5be675b8e46659
-
SHA1
780b05842c95f5ecb1d0ae8cb4202220eb9e4142
-
SHA256
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad
-
SHA512
e5339b161099ad095f63eaf88a25a550e6a0e0e3baf0d96302517b9bc77a59fd2b8a90dd39c92ae1e2ed8de9e774214d099b68060d1667d58846693d6d8c819a
-
SSDEEP
12288:VuXz+6yYrqyTh+jOsxgRISEt/9/RooArydEQNZZ9kuHV33nPXjpVtNxJq8L:M+6rhqNugiMdBHVHPzzJL
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4300 1468 WerFault.exe 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe -
Modifies registry class 10 IoCs
Processes:
654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC} 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler\ = "this is my ebook" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler\Clsid\ = "{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ = "this is my ebook" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler\Clsid 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E8CFC029-8420-4EAE-ADEF-915BDC77E1DC}\ProgID\ = "654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.MyNSHandler" 654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe"C:\Users\Admin\AppData\Local\Temp\654f59f6a6446921427ac23948f54415702cbb5d9897053a7e5f1c23055da3ad.exe"1⤵
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 7162⤵
- Program crash
PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1468 -ip 14681⤵PID:4892