Analysis
-
max time kernel
166s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe
Resource
win10v2004-20230915-en
General
-
Target
87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe
-
Size
1.3MB
-
MD5
d35fd3d3358aef896a156e3e6e5d84cd
-
SHA1
e8b14b7e8fe33099300601efdf69d74a30b1dc95
-
SHA256
87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470
-
SHA512
522de285c5d3eb441d7a8bceeb041163a8a6e5f258cba4f409ee5c13edc274846a3ee016065f30cc52867e2eb51559ed63cfdb9cf8b2e5a7d6d5d71dd784df32
-
SSDEEP
24576:UcvaDKBaZSeA/+RvgswfkNoKUCuO5az/rhPV52oE:U1Q2RgkNo7Fz/VPVG
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3636 1268 WerFault.exe 86 2384 1268 WerFault.exe 86 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe Token: SeIncBasePriorityPrivilege 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe 1268 87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe"C:\Users\Admin\AppData\Local\Temp\87a84b3c067e8f91e9d40dfd9271f007cbd2b23d46881ad85623a418fc7ed470.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7442⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 19162⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1268 -ip 12681⤵PID:3288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1268 -ip 12681⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a856278c58307ab4ea439594420e5430
SHA1a54dafa4c6e19bfa89654a1e58ad5b202f1726ef
SHA2565ffcedcb587f73bd26192b846c654ac04b6d1c536233524e76eef8bf1005e2ad
SHA512c2fcc19de229ec466c46f08ea300a92f36e8d29ddd51503c837cdc2d04f7c811279eb8ba548729c4a8ce68ce4ded2bcc6936c9c7832bd719dc5c336205bd9c34
-
Filesize
2KB
MD5fec603b7eb5202242bf1d1d6e651cec8
SHA18709162e897230da237842e1789f9fe741d91713
SHA256d6f77660b9ceeefea591dc59a9918e278b2e265dec97a7edd7b2ca5120bd4753
SHA5126997df7b1a1d8ee5a6a2ca5a472be3e80d89aab3acd13db2bac2cbf53bc6243a1707f730b9c25d1f54d489e1e4b43890db2252b9081796c468adda2dc3e3805c
-
Filesize
1KB
MD5a856278c58307ab4ea439594420e5430
SHA1a54dafa4c6e19bfa89654a1e58ad5b202f1726ef
SHA2565ffcedcb587f73bd26192b846c654ac04b6d1c536233524e76eef8bf1005e2ad
SHA512c2fcc19de229ec466c46f08ea300a92f36e8d29ddd51503c837cdc2d04f7c811279eb8ba548729c4a8ce68ce4ded2bcc6936c9c7832bd719dc5c336205bd9c34