Analysis

  • max time kernel
    131s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2023 02:36

General

  • Target

    SecuriteInfo.com.FileRepMetagen.11876.exe

  • Size

    1.7MB

  • MD5

    aa3d4b76c880ebae6f66305d6e7140e4

  • SHA1

    aae329425c4dcb425e30896e36cf0917a22aa487

  • SHA256

    850bacc0640ddc09d8f3a64a586b5e31f69c38a1d4028e8dd3151cb01bba89d2

  • SHA512

    91e7252e22d243c013f1fc4f6e633627734210588b129bfe517d1dc3d46c1e1e5363b6722eb34a71986accd4b845433e18992e843001f22661f24a816c28b7a9

  • SSDEEP

    49152:gJXbYWGHzMdCY0AsdAFOB5iJfqUquW+CzaB+:SNGwdaAIAFqfPL7zr

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMetagen.11876.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.FileRepMetagen.11876.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 960
      2⤵
      • Program crash
      PID:1608
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 972
      2⤵
      • Program crash
      PID:1624
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2152 -ip 2152
    1⤵
      PID:5116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2152 -ip 2152
      1⤵
        PID:908

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\SE2AC4.tmp

        Filesize

        1024B

        MD5

        12871388b682b159ddd85545302a289d

        SHA1

        76b47377da188fcfddeefa0f940287f1cce9885d

        SHA256

        cc033f00e96cae1829e3a5c15150fe68a62f65440f1b158d9257370fbc488a9b

        SHA512

        d60953b62d08e52fa2860db257e2bdbaa97e7eff7007617857f7b30a76f7c7ba81f8444d313a6ad496adbbaede5af1661e72522046789bb9aee1340f7ac12c7d

      • memory/2152-0-0x0000000000400000-0x00000000005AA000-memory.dmp

        Filesize

        1.7MB

      • memory/2152-3-0x0000000076940000-0x0000000076B55000-memory.dmp

        Filesize

        2.1MB

      • memory/2152-3879-0x0000000002640000-0x00000000027F4000-memory.dmp

        Filesize

        1.7MB

      • memory/2152-3880-0x00000000761F0000-0x0000000076390000-memory.dmp

        Filesize

        1.6MB

      • memory/2152-5890-0x00000000765C0000-0x000000007663A000-memory.dmp

        Filesize

        488KB

      • memory/2152-11785-0x0000000002640000-0x00000000027F4000-memory.dmp

        Filesize

        1.7MB

      • memory/2152-13083-0x0000000004120000-0x0000000004121000-memory.dmp

        Filesize

        4KB

      • memory/2152-13084-0x0000000000400000-0x00000000005AA000-memory.dmp

        Filesize

        1.7MB