Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
b0ac22234326a1c443973ea2a5a8d8e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b0ac22234326a1c443973ea2a5a8d8e3.exe
Resource
win10v2004-20231215-en
General
-
Target
b0ac22234326a1c443973ea2a5a8d8e3.exe
-
Size
654KB
-
MD5
b0ac22234326a1c443973ea2a5a8d8e3
-
SHA1
2dd9bbd7e5291e52d48c88fdb708e31532b1e14b
-
SHA256
06062d75f4aecc9a8dcce83ddf567fa1c67c03e0c1f346033e88dbf29846af4b
-
SHA512
262e4ef9ce30b8b055bb4fe7b1cd48891238af86fe33fad61d334c92e853318fe261d4283158fa109f1fa194a7689e7571d0ad1e84f5977df79f9d0f3730c8ef
-
SSDEEP
12288:XxVSRejAT8F9YafmQFHRgu25Vo3c4mDkjz/50f:hVSRR8UkmUdGVoomzh0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation b0ac22234326a1c443973ea2a5a8d8e3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 3188 3292 WerFault.exe 14 1196 3292 WerFault.exe 14 2996 3292 WerFault.exe 14 2704 3292 WerFault.exe 14 2484 3292 WerFault.exe 14 4432 3292 WerFault.exe 14 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 436 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3292 wrote to memory of 1952 3292 b0ac22234326a1c443973ea2a5a8d8e3.exe 104 PID 3292 wrote to memory of 1952 3292 b0ac22234326a1c443973ea2a5a8d8e3.exe 104 PID 3292 wrote to memory of 1952 3292 b0ac22234326a1c443973ea2a5a8d8e3.exe 104 PID 1952 wrote to memory of 436 1952 cmd.exe 106 PID 1952 wrote to memory of 436 1952 cmd.exe 106 PID 1952 wrote to memory of 436 1952 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0ac22234326a1c443973ea2a5a8d8e3.exe"C:\Users\Admin\AppData\Local\Temp\b0ac22234326a1c443973ea2a5a8d8e3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 7602⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 7322⤵
- Program crash
PID:1196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8242⤵
- Program crash
PID:2996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8242⤵
- Program crash
PID:2704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 8002⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 9962⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping localhost -n 4 && del "C:\Users\Admin\AppData\Local\Temp\b0ac22234326a1c443973ea2a5a8d8e3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 43⤵
- Runs ping.exe
PID:436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3292 -ip 32921⤵PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3292 -ip 32921⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3292 -ip 32921⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3292 -ip 32921⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 32921⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3292 -ip 32921⤵PID:4876