Analysis
-
max time kernel
163s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 07:59
Behavioral task
behavioral1
Sample
50039c5c1ddf1adfe3ee4cb11332bf70.exe
Resource
win7-20231215-en
General
-
Target
50039c5c1ddf1adfe3ee4cb11332bf70.exe
-
Size
666KB
-
MD5
50039c5c1ddf1adfe3ee4cb11332bf70
-
SHA1
e169d709b1275419736035bc66ac2ff5e1359ea6
-
SHA256
213c51fe725536ddf49bec4716bec26f7f09700a052ae56b305d783ecbbfd349
-
SHA512
345800d6dbbab06e9499e0fa330947293bc9adc892064ad6ae4ca3acf81aae8d2794320cce74bee2180ab484e43955f6a112cf5ed20c60528221460dcc136e89
-
SSDEEP
12288:TuICix5biGGkpfJaQRLWpxeTMb3LGr3t0aX/pShgQwM7TwXwodf3nut:TJCKVkQR0eTMb3LGr3lXIhxwiUwcfnut
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50039c5c1ddf1adfe3ee4cb11332bf70.exe -
resource yara_rule behavioral2/memory/1504-0-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-1-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-2-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-3-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-4-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-5-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-15-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-17-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-18-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-19-0x0000000000400000-0x00000000005C7000-memory.dmp upx behavioral2/memory/1504-20-0x0000000000400000-0x00000000005C7000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 50039c5c1ddf1adfe3ee4cb11332bf70.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 50039c5c1ddf1adfe3ee4cb11332bf70.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1544 1504 WerFault.exe 89 5096 1504 WerFault.exe 89 -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1544 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 105 PID 1504 wrote to memory of 1544 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 105 PID 1504 wrote to memory of 1544 1504 50039c5c1ddf1adfe3ee4cb11332bf70.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\50039c5c1ddf1adfe3ee4cb11332bf70.exe"C:\Users\Admin\AppData\Local\Temp\50039c5c1ddf1adfe3ee4cb11332bf70.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 24802⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 24802⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1504 -ip 15041⤵PID:2584