Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-es -
resource tags
arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
05/10/2023, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
ASZZFact_PDF_LRBQ2926IXSO6512.exe
Resource
win7-20230831-es
Behavioral task
behavioral2
Sample
ASZZFact_PDF_LRBQ2926IXSO6512.exe
Resource
win10v2004-20230915-es
General
-
Target
ASZZFact_PDF_LRBQ2926IXSO6512.exe
-
Size
107.7MB
-
MD5
435aa21d98017a09a510efdaea9ace70
-
SHA1
e12d3c810dd4f77c4715a08a81b5b6e100ce0a68
-
SHA256
a8bfe39de52fcdaf09af77c53658b16dfa62e29923989b2382c7b5ee6c41fe4d
-
SHA512
4d2b3cb4571d54a45b7373bd8a0fb426aa9d9ace6207b46dd732a57281f43aef0919597d304b2f506b366b0848eb3dc716a68228be01f8276ce73f0a3877b09e
-
SSDEEP
98304:ATBdMQv0Y0XcyzAO4b01MrSm2E5Q/SNaRii7ZVkY0NUw15N1St6:KBdM9fLE1URF7D0Nj5N1St6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2860 5100 WerFault.exe 82 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ASZZFact_PDF_LRBQ2926IXSO6512.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ASZZFact_PDF_LRBQ2926IXSO6512.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ASZZFact_PDF_LRBQ2926IXSO6512.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ASZZFact_PDF_LRBQ2926IXSO6512.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName ASZZFact_PDF_LRBQ2926IXSO6512.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ASZZFact_PDF_LRBQ2926IXSO6512.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5100 ASZZFact_PDF_LRBQ2926IXSO6512.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ASZZFact_PDF_LRBQ2926IXSO6512.exe"C:\Users\Admin\AppData\Local\Temp\ASZZFact_PDF_LRBQ2926IXSO6512.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 10562⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5100 -ip 51001⤵PID:3776