Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
???www.xzking.com.url
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
???www.xzking.com.url
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
readme.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
readme.url
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
syqgmflzcb/??????????????.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
syqgmflzcb/??????????????.exe
Resource
win10v2004-20240508-en
General
-
Target
syqgmflzcb/??????????????.exe
-
Size
12.4MB
-
MD5
88acaa227fc3155de6804f7cdf7795c2
-
SHA1
dc40b4a233a86012c903396623ae300cff98d4dc
-
SHA256
bfc0a8b03dd0bce525423b3109bb025c39d8b3277fff975dea36b74cb067bcab
-
SHA512
d840976a0e43c2ef52f39afd69c517f8b3c3be9bab71836f1924e45f7627474fa50410aa4b1026e4cfc56bf251f91ab872b0d1b11b63e814c9d2bfcef91bb3f0
-
SSDEEP
393216:p0ZPBtYsCrPE2i+QYwmC/KGKoFXcnmyFg7DujEA:6ZZ6sQsFrKoomyFg7DujEA
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
______________.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ______________.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ______________.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2724 3008 WerFault.exe ______________.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
______________.exedescription pid process target process PID 3008 wrote to memory of 2724 3008 ______________.exe WerFault.exe PID 3008 wrote to memory of 2724 3008 ______________.exe WerFault.exe PID 3008 wrote to memory of 2724 3008 ______________.exe WerFault.exe PID 3008 wrote to memory of 2724 3008 ______________.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\syqgmflzcb\______________.exe"C:\Users\Admin\AppData\Local\Temp\syqgmflzcb\______________.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 5602⤵
- Program crash
PID:2724