Analysis
-
max time kernel
144s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 08:31
Static task
static1
Behavioral task
behavioral1
Sample
5ffcd90e30a903c9bc27fad8390325d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ffcd90e30a903c9bc27fad8390325d3.exe
Resource
win10v2004-20231222-en
General
-
Target
5ffcd90e30a903c9bc27fad8390325d3.exe
-
Size
893KB
-
MD5
5ffcd90e30a903c9bc27fad8390325d3
-
SHA1
ef10c916ea63fb3dd09c974954f7486e652c0c46
-
SHA256
43739b58b7db0849592610c7d29404ca0b4e7358af258df643f698270a3e8997
-
SHA512
fa1af37753df49e472def448efcfed63e32b5266442c0d0743488a747583e5e356bb9d2ade76ec4767be4d159e9e6d8f4d972b467b29837bc1e8c5a149919e32
-
SSDEEP
24576:9YY2DlN2D32DCiF60bSQVXRtsY9lcnCxeggEZh:WRkaedQVXXsLCx5fh
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ffcd90e30a903c9bc27fad8390325d3.exe -
resource yara_rule behavioral2/memory/2704-4-0x000000002D160000-0x000000002D171000-memory.dmp upx behavioral2/memory/2704-6-0x000000002EED0000-0x000000002EF08000-memory.dmp upx behavioral2/memory/2704-5-0x000000002EED0000-0x000000002EF08000-memory.dmp upx behavioral2/memory/2704-3-0x000000002D160000-0x000000002D171000-memory.dmp upx behavioral2/memory/2704-2-0x000000002D160000-0x000000002D171000-memory.dmp upx behavioral2/memory/2704-1-0x000000002D160000-0x000000002D171000-memory.dmp upx behavioral2/memory/2704-0-0x000000002D160000-0x000000002D171000-memory.dmp upx behavioral2/memory/2704-21-0x000000002EED0000-0x000000002EF08000-memory.dmp upx behavioral2/memory/2704-20-0x000000002D160000-0x000000002D171000-memory.dmp upx behavioral2/memory/2704-22-0x000000002D160000-0x000000002D171000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2452 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 22 -
Program crash 2 IoCs
pid pid_target Process procid_target 3604 2704 WerFault.exe 14 4052 2452 WerFault.exe 22 -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 5ffcd90e30a903c9bc27fad8390325d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 5ffcd90e30a903c9bc27fad8390325d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ffcd90e30a903c9bc27fad8390325d3.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5ffcd90e30a903c9bc27fad8390325d3.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 5ffcd90e30a903c9bc27fad8390325d3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 2704 5ffcd90e30a903c9bc27fad8390325d3.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2028 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 26 PID 2704 wrote to memory of 2028 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 26 PID 2704 wrote to memory of 2028 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 26 PID 2704 wrote to memory of 2028 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 26 PID 2704 wrote to memory of 2028 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 26 PID 2704 wrote to memory of 2028 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 26 PID 2704 wrote to memory of 3324 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 23 PID 2704 wrote to memory of 3324 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 23 PID 2704 wrote to memory of 3324 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 23 PID 2704 wrote to memory of 3324 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 23 PID 2704 wrote to memory of 3324 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 23 PID 2704 wrote to memory of 3324 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 23 PID 2704 wrote to memory of 2452 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 22 PID 2704 wrote to memory of 2452 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 22 PID 2704 wrote to memory of 2452 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 22 PID 2704 wrote to memory of 2452 2704 5ffcd90e30a903c9bc27fad8390325d3.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exe"C:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exeC:\Users\Admin\AppData\Local\Temp\5ffcd90e30a903c9bc27fad8390325d3.exe2⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 803⤵
- Program crash
PID:4052
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:3324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 6642⤵
- Program crash
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2452 -ip 24521⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2704 -ip 27041⤵PID:3192