Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
11fbc5fad342a67adeb4f21e66df2504.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11fbc5fad342a67adeb4f21e66df2504.exe
Resource
win10v2004-20231215-en
General
-
Target
11fbc5fad342a67adeb4f21e66df2504.exe
-
Size
523KB
-
MD5
11fbc5fad342a67adeb4f21e66df2504
-
SHA1
91ccf93603a5b06baf580e323c9c44c92d7a637a
-
SHA256
20b891c8b8fb40f21e01da4e7b30094ede611ceb905423d6efd5f95800b01b9b
-
SHA512
94a39492ac63afce21e4b41c386cc8566105ec4382dc0dbeec3c9b208cf1b1a6a9f3faceae0e8df1b1fe3931bf59aadd8dacb5e9e9e9556b89f27a73e865d61e
-
SSDEEP
12288:sL7GuyK/RFuWzlbyCCVUVrvet55WaVwzOFd2RnKLbNaQ/CX2xVkNm:QXyidzJynUVc5YaiOGRKXNCuGNm
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11fbc5fad342a67adeb4f21e66df2504.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 11fbc5fad342a67adeb4f21e66df2504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 11fbc5fad342a67adeb4f21e66df2504.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4608 3144 WerFault.exe 86 3504 3144 WerFault.exe 86 -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe 3144 11fbc5fad342a67adeb4f21e66df2504.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11fbc5fad342a67adeb4f21e66df2504.exe"C:\Users\Admin\AppData\Local\Temp\11fbc5fad342a67adeb4f21e66df2504.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:3144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 9762⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 26282⤵
- Program crash
PID:3504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3144 -ip 31441⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3144 -ip 31441⤵PID:3248