Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe
-
Size
157KB
-
MD5
2542beb7cd704c3c3aa6e4e20e8d29f8
-
SHA1
c7270927d359d23ed2e61f08424f425f828e7596
-
SHA256
c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e
-
SHA512
e2d5162b6639f0c8a1668c382c209b6aceb876ed3e0c033225b3f9862f54742f4073cbd39e5d192f12adac1f7ed67b23215ad4b191340bb11317da91dfe845c0
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 604 908 WerFault.exe c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exedescription pid process Token: SeDebugPrivilege 908 c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exedescription pid process target process PID 908 wrote to memory of 604 908 c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe WerFault.exe PID 908 wrote to memory of 604 908 c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe WerFault.exe PID 908 wrote to memory of 604 908 c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe WerFault.exe PID 908 wrote to memory of 604 908 c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe"C:\Users\Admin\AppData\Local\Temp\c2ba188ec0f7779fbbc177a90da7591da1aeba1245e677d02ad83d72831db75e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 11042⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/604-59-0x0000000000000000-mapping.dmp
-
memory/908-54-0x0000000000050000-0x0000000000080000-memory.dmpFilesize
192KB
-
memory/908-55-0x0000000000220000-0x0000000000226000-memory.dmpFilesize
24KB
-
memory/908-56-0x00000000003C0000-0x00000000003DE000-memory.dmpFilesize
120KB
-
memory/908-57-0x00000000003E0000-0x00000000003E6000-memory.dmpFilesize
24KB
-
memory/908-58-0x0000000075CD1000-0x0000000075CD3000-memory.dmpFilesize
8KB