Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
11d5bb2ef9188b3ef699e17d0572a531.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11d5bb2ef9188b3ef699e17d0572a531.exe
Resource
win10v2004-20231222-en
General
-
Target
11d5bb2ef9188b3ef699e17d0572a531.exe
-
Size
873KB
-
MD5
11d5bb2ef9188b3ef699e17d0572a531
-
SHA1
bd92128fc5fcf88741d6040cfb204c0a30ef15e8
-
SHA256
cd8d77b27aa47b0f15754182cda7440a5ba4d266ed94df56865da3e1cc8aa389
-
SHA512
7d1dbb0762a9633103832f712e524a0cee2634c3572b405307418cc98a8bac0eb48226c9569645ba5170ffd792aa8fecb9b41ba40a79ba5513c46ee8109f93ee
-
SSDEEP
24576:n33f6iBcSgv6QpC6pvQcHeIFTpQuUmAHoEz:nf6YcS01vQgVdcFz
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11d5bb2ef9188b3ef699e17d0572a531.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11d5bb2ef9188b3ef699e17d0572a531.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11d5bb2ef9188b3ef699e17d0572a531.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11d5bb2ef9188b3ef699e17d0572a531.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 11d5bb2ef9188b3ef699e17d0572a531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11d5bb2ef9188b3ef699e17d0572a531.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 11d5bb2ef9188b3ef699e17d0572a531.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4696 set thread context of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 -
Program crash 2 IoCs
pid pid_target Process procid_target 384 1552 WerFault.exe 30 740 1552 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1552 11d5bb2ef9188b3ef699e17d0572a531.exe 1552 11d5bb2ef9188b3ef699e17d0572a531.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1552 11d5bb2ef9188b3ef699e17d0572a531.exe 1552 11d5bb2ef9188b3ef699e17d0572a531.exe 1552 11d5bb2ef9188b3ef699e17d0572a531.exe 1552 11d5bb2ef9188b3ef699e17d0572a531.exe 1552 11d5bb2ef9188b3ef699e17d0572a531.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30 PID 4696 wrote to memory of 1552 4696 11d5bb2ef9188b3ef699e17d0572a531.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\11d5bb2ef9188b3ef699e17d0572a531.exe"C:\Users\Admin\AppData\Local\Temp\11d5bb2ef9188b3ef699e17d0572a531.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\11d5bb2ef9188b3ef699e17d0572a531.exe"C:\Users\Admin\AppData\Local\Temp\11d5bb2ef9188b3ef699e17d0572a531.exe" Track=""2⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 20163⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 22963⤵
- Program crash
PID:740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1552 -ip 15521⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1552 -ip 15521⤵PID:1836