Analysis
-
max time kernel
2s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
03-07-2021 10:44
Static task
static1
Behavioral task
behavioral1
Sample
1234ece43aa87d86c894c56e624542f1.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
1234ece43aa87d86c894c56e624542f1.exe
-
Size
406KB
-
MD5
1234ece43aa87d86c894c56e624542f1
-
SHA1
269434459fefa03f3953eef1884b346610dd1b94
-
SHA256
21dbbf625ccd9bf9aae178bf9a5ff84db58aea912166836924b7aa9bbce0443c
-
SHA512
649475a6b92e0411e6fdd8618fec5835b1f0357f3b8586a3de042dc04261f6251d40d0e1036884ed199af65b1b53c03848214f35cdae1ef47226c80462c44519
Malware Config
Signatures
-
DarkVNC Payload 2 IoCs
resource yara_rule behavioral1/memory/1084-62-0x00000000002E0000-0x0000000000368000-memory.dmp darkvnc behavioral1/memory/1084-63-0x0000000000400000-0x000000000060F000-memory.dmp darkvnc -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1084 set thread context of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1084 1234ece43aa87d86c894c56e624542f1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28 PID 1084 wrote to memory of 1720 1084 1234ece43aa87d86c894c56e624542f1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1234ece43aa87d86c894c56e624542f1.exe"C:\Users\Admin\AppData\Local\Temp\1234ece43aa87d86c894c56e624542f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe2⤵PID:1720
-