Analysis

  • max time kernel
    153s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    05/10/2023, 01:09

General

  • Target

    ASZZFact_PDF_LRBQ2926IXSO6512.exe

  • Size

    107.7MB

  • MD5

    435aa21d98017a09a510efdaea9ace70

  • SHA1

    e12d3c810dd4f77c4715a08a81b5b6e100ce0a68

  • SHA256

    a8bfe39de52fcdaf09af77c53658b16dfa62e29923989b2382c7b5ee6c41fe4d

  • SHA512

    4d2b3cb4571d54a45b7373bd8a0fb426aa9d9ace6207b46dd732a57281f43aef0919597d304b2f506b366b0848eb3dc716a68228be01f8276ce73f0a3877b09e

  • SSDEEP

    98304:ATBdMQv0Y0XcyzAO4b01MrSm2E5Q/SNaRii7ZVkY0NUw15N1St6:KBdM9fLE1URF7D0Nj5N1St6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ASZZFact_PDF_LRBQ2926IXSO6512.exe
    "C:\Users\Admin\AppData\Local\Temp\ASZZFact_PDF_LRBQ2926IXSO6512.exe"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:5100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1056
      2⤵
      • Program crash
      PID:2860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5100 -ip 5100
    1⤵
      PID:3776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5100-0-0x0000000009B90000-0x0000000009B91000-memory.dmp

      Filesize

      4KB

    • memory/5100-1-0x0000000000960000-0x0000000001960000-memory.dmp

      Filesize

      16.0MB

    • memory/5100-2-0x0000000009B90000-0x0000000009B91000-memory.dmp

      Filesize

      4KB

    • memory/5100-7-0x0000000000960000-0x0000000001960000-memory.dmp

      Filesize

      16.0MB