Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
29-10-2021 12:05
Static task
static1
Behavioral task
behavioral1
Sample
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe
-
Size
258KB
-
MD5
4abfad65054e3e3f890a6ebb6f927d68
-
SHA1
27dd679bd31b3c4511b66321c9dbd51829989729
-
SHA256
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1
-
SHA512
625bb855c9cc02e48e8c939b5d56aee31e26860d03c50c5cdb721565ed2e822bebdf2020b002259a1c1b55a7b3d3d71f9096745e0894ff624becc21da9004eec
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1512 476 WerFault.exe efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1512 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1512 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exepid process 476 efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exedescription pid process target process PID 476 wrote to memory of 1512 476 efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe WerFault.exe PID 476 wrote to memory of 1512 476 efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe WerFault.exe PID 476 wrote to memory of 1512 476 efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe WerFault.exe PID 476 wrote to memory of 1512 476 efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe"C:\Users\Admin\AppData\Local\Temp\efaecc96942d1988b9adb7419ea8aaaae42ca045286a854109bbe9f29dc2c8f1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 476 -s 2122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/476-55-0x0000000000220000-0x0000000000226000-memory.dmpFilesize
24KB
-
memory/476-56-0x0000000000220000-0x000000000022A000-memory.dmpFilesize
40KB
-
memory/1512-57-0x0000000000000000-mapping.dmp
-
memory/1512-58-0x0000000075B71000-0x0000000075B73000-memory.dmpFilesize
8KB
-
memory/1512-59-0x0000000000310000-0x000000000034F000-memory.dmpFilesize
252KB