Analysis
-
max time kernel
38s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-06-2022 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe
-
Size
328KB
-
MD5
1a848d9da35b7e5d8faa66c836e94861
-
SHA1
f161a407f9e3fecf8d1739cc841f2376db566c5d
-
SHA256
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb
-
SHA512
f1cef77fc5781c9e4ce15d5e2ffce9f658446f8bbab98a107e994fa701b73f5616b4d710cc1e33362d5b46f907c6efa4bc56c7d34f9105c80336b14e34b323d5
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1668 1768 WerFault.exe 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exepid process 1768 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exedescription pid process target process PID 1768 wrote to memory of 1668 1768 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe WerFault.exe PID 1768 wrote to memory of 1668 1768 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe WerFault.exe PID 1768 wrote to memory of 1668 1768 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe WerFault.exe PID 1768 wrote to memory of 1668 1768 1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe"C:\Users\Admin\AppData\Local\Temp\1aa5697f96a51fd5c776b394adbc732ab28b5b3228077dc11608b2a131cb5bfb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 3482⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1668-57-0x0000000000000000-mapping.dmp
-
memory/1768-56-0x0000000075C01000-0x0000000075C03000-memory.dmpFilesize
8KB
-
memory/1768-58-0x0000000001DE0000-0x0000000001EF0000-memory.dmpFilesize
1.1MB
-
memory/1768-59-0x00000000002B0000-0x00000000002BA000-memory.dmpFilesize
40KB
-
memory/1768-60-0x00000000002B0000-0x00000000002BA000-memory.dmpFilesize
40KB
-
memory/1768-61-0x00000000002B0000-0x00000000002BA000-memory.dmpFilesize
40KB