Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
ca6d8d712bec2ac010ace47b70719fbd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca6d8d712bec2ac010ace47b70719fbd.exe
Resource
win10v2004-20240226-en
General
-
Target
ca6d8d712bec2ac010ace47b70719fbd.exe
-
Size
577KB
-
MD5
ca6d8d712bec2ac010ace47b70719fbd
-
SHA1
84f3c6f45dc8db755d4e137f5048caf989957c21
-
SHA256
0610ec07519169492ccd24b08b660bcd0452a8c39bc0da08199f0f3d89bc6ae0
-
SHA512
b89d62e36db656c7cb5d3d309902fcc80f933779bf2182a8ab987c96ffa57229bb11e9b1dbbdb9d0bad9b45e5c30c9e4ae6e0603603e00f8c1b9c1c34315a9d8
-
SSDEEP
12288:oSyoOPqWcMqA/miet58gULwxgIYP2hjhTH25:oSyoTW/XeLzMOY+ht2
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca6d8d712bec2ac010ace47b70719fbd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ca6d8d712bec2ac010ace47b70719fbd.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ca6d8d712bec2ac010ace47b70719fbd.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4592 4156 WerFault.exe 88 764 4156 WerFault.exe 88 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4156 ca6d8d712bec2ac010ace47b70719fbd.exe Token: SeIncBasePriorityPrivilege 4156 ca6d8d712bec2ac010ace47b70719fbd.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe 4156 ca6d8d712bec2ac010ace47b70719fbd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca6d8d712bec2ac010ace47b70719fbd.exe"C:\Users\Admin\AppData\Local\Temp\ca6d8d712bec2ac010ace47b70719fbd.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 25442⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 26002⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4156 -ip 41561⤵PID:3088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4156 -ip 41561⤵PID:4820