Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2023 06:15
Behavioral task
behavioral1
Sample
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe
Resource
win10v2004-20230220-en
General
-
Target
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe
-
Size
5.7MB
-
MD5
a3e00683f90fa46499ba89dfe5a57f7d
-
SHA1
c0c0c8733ad190c178c7b6d9e1fa612de7e7c83f
-
SHA256
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660
-
SHA512
48eec736ec5e77780133436c0b041d1f1aff0b27786a7354e4369e726ff29008fadfced30676a595804afc2a4f519805a118a317ea90c39dc4f3e88f013d234d
-
SSDEEP
98304:fUeuxegvf1Bu7YJoVxqjAPxNrBpH/ZuYkhxlerKdkwaMzCQddlkn8Bu2PlyqX:fUeRgHgr3PxNrbZuYkfl4YaMzCQd/u8Z
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exedescription ioc process File opened (read-only) \??\o: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\p: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\s: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\w: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\z: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\a: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\j: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\l: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\x: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\h: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\i: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\k: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\u: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\v: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\b: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\e: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\t: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\n: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\q: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\r: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\y: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\f: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\g: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe File opened (read-only) \??\m: 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exedescription ioc process File opened for modification \??\PhysicalDrive0 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1980 5032 WerFault.exe 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exepid process 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exepid process 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exepid process 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exepid process 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe 5032 69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe"C:\Users\Admin\AppData\Local\Temp\69cbadd65c48ad5b22a44f405b9faad3ab7e50bc62ae16bdf4805122d1af4660.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 4842⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5032 -ip 50321⤵