Analysis
-
max time kernel
116s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
23ea20fb1a031015b134b4c69e6d772e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23ea20fb1a031015b134b4c69e6d772e.exe
Resource
win10v2004-20231215-en
General
-
Target
23ea20fb1a031015b134b4c69e6d772e.exe
-
Size
1.5MB
-
MD5
23ea20fb1a031015b134b4c69e6d772e
-
SHA1
474b0bf20ddb80ee7966c83ddb60d2f63bd503ac
-
SHA256
8563c8a2b17aa37ca8739f005d109fd532cd6f56e25f6d216fbfe3c497eb5a22
-
SHA512
fccef94ca33b2a37b4bd163203bcb5fac179c11ce2ff12e7123b2adb3768fadb8fbdabe06c92502521e70c811d38592dceade405baa435658cbb6e922554027d
-
SSDEEP
24576:XkGQp66snFPOOAr4cHX10m0NTzSOqb6u/Yd72ftPLCQmO5F8SSm8uYVdEbK:XkJspwZHXWm0NT7g6rdyftTCQmOvxYCK
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 23ea20fb1a031015b134b4c69e6d772e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 23ea20fb1a031015b134b4c69e6d772e.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 23ea20fb1a031015b134b4c69e6d772e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 23ea20fb1a031015b134b4c69e6d772e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3516 set thread context of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 5084 4388 WerFault.exe 89 4352 4388 WerFault.exe 89 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4388 23ea20fb1a031015b134b4c69e6d772e.exe 4388 23ea20fb1a031015b134b4c69e6d772e.exe 4388 23ea20fb1a031015b134b4c69e6d772e.exe 4388 23ea20fb1a031015b134b4c69e6d772e.exe 4388 23ea20fb1a031015b134b4c69e6d772e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89 PID 3516 wrote to memory of 4388 3516 23ea20fb1a031015b134b4c69e6d772e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ea20fb1a031015b134b4c69e6d772e.exe"C:\Users\Admin\AppData\Local\Temp\23ea20fb1a031015b134b4c69e6d772e.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\23ea20fb1a031015b134b4c69e6d772e.exe"C:\Users\Admin\AppData\Local\Temp\23ea20fb1a031015b134b4c69e6d772e.exe" Track="0001001000"2⤵
- Suspicious use of SetWindowsHookEx
PID:4388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 20123⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 20603⤵
- Program crash
PID:4352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4388 -ip 43881⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4388 -ip 43881⤵PID:2588