Analysis
-
max time kernel
28s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 17:21
Static task
static1
Behavioral task
behavioral1
Sample
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe
-
Size
1.8MB
-
MD5
b826bb2b62dab956a48a12d4e27ea3a5
-
SHA1
b3dfdb88640cfad86d42d7f65bc70fb7831076c0
-
SHA256
3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759
-
SHA512
c15233dedf2fc24de8d8f5f01c63e98a2844c18303dc3b10528e1441067c1b1f85a32f417027ea90a7f4c82764cf2a53482300e8af54a4055c0cfa4c713c2c03
Score
10/10
Malware Config
Signatures
-
suricata: ET MALWARE Legion Loader Activity Observed (suspira)
suricata: ET MALWARE Legion Loader Activity Observed (suspira)
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
pid pid_target Process procid_target 580 1796 WerFault.exe 24 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30 PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30 PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30 PID 1796 wrote to memory of 580 1796 3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe"C:\Users\Admin\AppData\Local\Temp\3933da33446b776c22ea0e84b7cc3e93a122be7960985231027a3be80a068759.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 8722⤵
- Program crash
PID:580
-