Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05/07/2023, 17:35
Behavioral task
behavioral1
Sample
16713d8d799bd4exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
16713d8d799bd4exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
16713d8d799bd4exeexeexeex.exe
-
Size
70KB
-
MD5
16713d8d799bd483497b73a84f3564f5
-
SHA1
be98efcd0e1b8a5b0708d6b6910f7bfd00f54572
-
SHA256
ec47308123d4943efe4d87d26d14ed70b9eff8db67992e95a4f433b22ef0df5d
-
SHA512
362540c32a259eb1871f7233322a28bdb5441bda2173e562d2531a7bb5334afbf6ce2bd2dee7f164b617c5044492868cfc75df2352d245a5821bee20002db83e
-
SSDEEP
1536:8ZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:Dd5BJHMqqDL2/OvvdrH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\zyaeuaafanm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\16713d8d799bd4exeexeexeex.exe" 16713d8d799bd4exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-719110999-4061093145-1944564496-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 16713d8d799bd4exeexeexeex.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\G: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\K: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\L: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\O: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\P: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\T: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\V: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\Y: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\E: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\F: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\H: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\I: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\N: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\S: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\U: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\W: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\X: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\A: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\J: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\M: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\Q: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\R: 16713d8d799bd4exeexeexeex.exe File opened (read-only) \??\Z: 16713d8d799bd4exeexeexeex.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 2268 WerFault.exe 28 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 16713d8d799bd4exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 16713d8d799bd4exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 16713d8d799bd4exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2268 16713d8d799bd4exeexeexeex.exe 2268 16713d8d799bd4exeexeexeex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2964 2268 16713d8d799bd4exeexeexeex.exe 30 PID 2268 wrote to memory of 2964 2268 16713d8d799bd4exeexeexeex.exe 30 PID 2268 wrote to memory of 2964 2268 16713d8d799bd4exeexeexeex.exe 30 PID 2268 wrote to memory of 2964 2268 16713d8d799bd4exeexeexeex.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\16713d8d799bd4exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\16713d8d799bd4exeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 5162⤵
- Program crash
PID:2964
-