Analysis
-
max time kernel
0s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
625e7e743e2b55f0decbbd806c33f727.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
625e7e743e2b55f0decbbd806c33f727.exe
Resource
win10v2004-20231222-en
General
-
Target
625e7e743e2b55f0decbbd806c33f727.exe
-
Size
1.1MB
-
MD5
625e7e743e2b55f0decbbd806c33f727
-
SHA1
de0a98e03953b90d374ac0ccb79622ed15c43dce
-
SHA256
244be4e2db5e6b5757cc030d9f719257532725f30f1207261db941bc9c477903
-
SHA512
ce20cebc1cf62f6ebca091c7e7d4bad68eeeee527c895fc22454d56bc001a5761e800b7444e8f229cc5af350479cd75ff4bea8efc5f27319d5c576033f81c26c
-
SSDEEP
12288:zkP9YgDp9RgVyuYqNAPxz2Y6KLvOnR/jdMaI/VqcXXoXRgYNth7WFD1LgJu2uQtM:zkvDp9aEvkpMasXXceQHSFD1LzXffBT
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 625e7e743e2b55f0decbbd806c33f727.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 625e7e743e2b55f0decbbd806c33f727.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 625e7e743e2b55f0decbbd806c33f727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 625e7e743e2b55f0decbbd806c33f727.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4976 set thread context of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 -
Program crash 2 IoCs
pid pid_target Process procid_target 3536 5024 WerFault.exe 24 5016 5024 WerFault.exe 24 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5024 625e7e743e2b55f0decbbd806c33f727.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24 PID 4976 wrote to memory of 5024 4976 625e7e743e2b55f0decbbd806c33f727.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\625e7e743e2b55f0decbbd806c33f727.exe"C:\Users\Admin\AppData\Local\Temp\625e7e743e2b55f0decbbd806c33f727.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\625e7e743e2b55f0decbbd806c33f727.exe"C:\Users\Admin\AppData\Local\Temp\625e7e743e2b55f0decbbd806c33f727.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 20243⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 20683⤵
- Program crash
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5024 -ip 50241⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5024 -ip 50241⤵PID:4720