Analysis
-
max time kernel
2s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 09:06
Static task
static1
Behavioral task
behavioral1
Sample
13d735a9a2e5288112a97b283ff81f5d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
13d735a9a2e5288112a97b283ff81f5d.exe
Resource
win10v2004-20231215-en
General
-
Target
13d735a9a2e5288112a97b283ff81f5d.exe
-
Size
823KB
-
MD5
13d735a9a2e5288112a97b283ff81f5d
-
SHA1
4a6c7d79c239584945f64e7004ebff35ea5e1ae4
-
SHA256
f0c46967b991bef4b0d4d5a32db125ec51c8442ad72f5641f401725480d8b316
-
SHA512
3b4b9febf566a123860245e97561d2020083fd0ed3557c991250f065180c33a78cbac1e6a581b186e8c592846d26871d3ef31f0cfbefebb5f5ab8a0e985d49d8
-
SSDEEP
24576:9VTMu+r0ovhZsqQv5XabyGO+8h6ey0OsFZjoKJGB:9V4K+T7Qv5qu/F/y09Zc
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\X: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\O: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\R: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\T: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\Q: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\V: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\E: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\H: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\P: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\S: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\Y: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\Z: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\J: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\L: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\M: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\N: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\U: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\G: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\I: 13d735a9a2e5288112a97b283ff81f5d.exe File opened (read-only) \??\K: 13d735a9a2e5288112a97b283ff81f5d.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 13d735a9a2e5288112a97b283ff81f5d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 2004 4556 WerFault.exe 89 2912 4556 WerFault.exe 89 2188 4556 WerFault.exe 89 3984 4556 WerFault.exe 89 3828 4556 WerFault.exe 89 1352 4556 WerFault.exe 89 2556 4556 WerFault.exe 89 1340 4556 WerFault.exe 89 4228 4556 WerFault.exe 89 2632 4556 WerFault.exe 89 1668 4556 WerFault.exe 89 -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4556 13d735a9a2e5288112a97b283ff81f5d.exe 4556 13d735a9a2e5288112a97b283ff81f5d.exe 4556 13d735a9a2e5288112a97b283ff81f5d.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4556 13d735a9a2e5288112a97b283ff81f5d.exe 4556 13d735a9a2e5288112a97b283ff81f5d.exe 4556 13d735a9a2e5288112a97b283ff81f5d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13d735a9a2e5288112a97b283ff81f5d.exe"C:\Users\Admin\AppData\Local\Temp\13d735a9a2e5288112a97b283ff81f5d.exe"1⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 7082⤵
- Program crash
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 7442⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 12122⤵
- Program crash
PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 12602⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 13802⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 12682⤵
- Program crash
PID:1352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 13802⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 12682⤵
- Program crash
PID:1340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 14282⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 19602⤵
- Program crash
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 12642⤵
- Program crash
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4556 -ip 45561⤵PID:2576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4556 -ip 45561⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4556 -ip 45561⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4556 -ip 45561⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4556 -ip 45561⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4556 -ip 45561⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4556 -ip 45561⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4556 -ip 45561⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4556 -ip 45561⤵PID:2600
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3604
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:5012
-
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:4944
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1800
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2556
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2776
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4248
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2484
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3640
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:920
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2720
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4244
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:3360
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2308
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2924
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4556 -ip 45561⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4556 -ip 45561⤵PID:2520