Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 05:42
Behavioral task
behavioral1
Sample
08db81eddffc3b2050e467a6dd3d3e87.exe
Resource
win7-20231129-en
General
-
Target
08db81eddffc3b2050e467a6dd3d3e87.exe
-
Size
663KB
-
MD5
08db81eddffc3b2050e467a6dd3d3e87
-
SHA1
a76199a3e87f744025721547b20202b77e3c7765
-
SHA256
152321028f08bc7536d47d797527c5cb693f9aa904877b1c61a77785f3e5cc50
-
SHA512
692d4872d9ae392d95d0b1d85bbb4605c77c9c1f08f6482d4b339d30f1b73b419781b3acdf2e30964059324e6b7e13dcbf35db471a23195848d4289c56e3607f
-
SSDEEP
12288:bbDqEkMs4q48IAeP0PifTEurPbvdqJplapLWTICNIYPKMTWN4t4OAUw91zRwIMfh:bXbs48LeP0P8E6dclWLi26KGOqMwIMZ
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08db81eddffc3b2050e467a6dd3d3e87.exe -
resource yara_rule behavioral2/memory/1904-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1904-1-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 08db81eddffc3b2050e467a6dd3d3e87.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 08db81eddffc3b2050e467a6dd3d3e87.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1936 1904 WerFault.exe 14 4688 1904 WerFault.exe 14 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1904 08db81eddffc3b2050e467a6dd3d3e87.exe 1904 08db81eddffc3b2050e467a6dd3d3e87.exe 1904 08db81eddffc3b2050e467a6dd3d3e87.exe 1904 08db81eddffc3b2050e467a6dd3d3e87.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08db81eddffc3b2050e467a6dd3d3e87.exe"C:\Users\Admin\AppData\Local\Temp\08db81eddffc3b2050e467a6dd3d3e87.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 22562⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 22082⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1904 -ip 19041⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1904 -ip 19041⤵PID:2792