Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2023 02:31
Behavioral task
behavioral1
Sample
fa4a6f5d8a6d50893f37a8dc5b33cf78.exe
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
fa4a6f5d8a6d50893f37a8dc5b33cf78.exe
-
Size
244KB
-
MD5
fa4a6f5d8a6d50893f37a8dc5b33cf78
-
SHA1
01d3a6b05db6ab86b1d2725efa320a54ad0db2d9
-
SHA256
09ae018ad25a48649ee3824aaa4251b388adc0c5f36c2355e28202adc737d353
-
SHA512
479b4d927c21993a623b6fbaf0c044a0563d70a9d7e588086e7a9c4e0bb07d806b39fc77058f9e505230700f71258f2b62361015b7e2e1e6441131985e7ea158
-
SSDEEP
1536:UYz/E8hW9NdYAygNlvhIoOl9SAKD7PNch1ZmmImh1ADN8blGe5SagvHLNaV8KJ3t:Um/E8k9ZjpIL+zNch12KbAwSaSCJSp8
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{9BC23924-E2BE-41A0-A4D3-DAA6583905C4}.catalogItem svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3372 2080 WerFault.exe 86 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3416
-
C:\Users\Admin\AppData\Local\Temp\fa4a6f5d8a6d50893f37a8dc5b33cf78.exe"C:\Users\Admin\AppData\Local\Temp\fa4a6f5d8a6d50893f37a8dc5b33cf78.exe"1⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2162⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2080 -ip 20801⤵PID:1608