Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
0f7277fc59297480c446d8c670697f7c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f7277fc59297480c446d8c670697f7c.exe
Resource
win10v2004-20231222-en
General
-
Target
0f7277fc59297480c446d8c670697f7c.exe
-
Size
1.1MB
-
MD5
0f7277fc59297480c446d8c670697f7c
-
SHA1
416b93f38d7768abf4a68a7f9ec55e7d06e17578
-
SHA256
1035929b77e25af9bccb3eb3f35cc948cec671bc7f054ef9d810cb5625e4d1d1
-
SHA512
b476783bc910629de672e9370019a2cb47838af57da783162b535275fbfcd0f7305bec34a27bdbbe2ad3ca074236966e03204e9f0f5e6c924b262e87b01219ac
-
SSDEEP
12288:zkP9YgDp9RgVyuYqNAPxz2Y6KLvOnR/jdMaI/VqcXXoXRgYNth7WFD1LgJu2uQtf:zkvDp9aEvkpMasXXceQHSFD1LzXffB4
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f7277fc59297480c446d8c670697f7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f7277fc59297480c446d8c670697f7c.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0f7277fc59297480c446d8c670697f7c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 0f7277fc59297480c446d8c670697f7c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4272 set thread context of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 -
Program crash 2 IoCs
pid pid_target Process procid_target 2824 912 WerFault.exe 23 2428 912 WerFault.exe 23 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 912 0f7277fc59297480c446d8c670697f7c.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23 PID 4272 wrote to memory of 912 4272 0f7277fc59297480c446d8c670697f7c.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f7277fc59297480c446d8c670697f7c.exe"C:\Users\Admin\AppData\Local\Temp\0f7277fc59297480c446d8c670697f7c.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\0f7277fc59297480c446d8c670697f7c.exe"C:\Users\Admin\AppData\Local\Temp\0f7277fc59297480c446d8c670697f7c.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 20323⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 20723⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 912 -ip 9121⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 912 -ip 9121⤵PID:1824