Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 16:45
Static task
static1
Behavioral task
behavioral1
Sample
407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe
-
Size
1.1MB
-
MD5
cd611e1f87a03308cd78e3d00643cc69
-
SHA1
b152637db3b0630b00c223bb9a65eaa2edeba2ce
-
SHA256
407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544
-
SHA512
17df753c03bb63696c76c11dfd0901d85510b99e9c312bbc042f04b501b432377ce8d1749768eabeafac2af289cf52722648c2375fef81ee1fc2e40551a16512
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 3408 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 4124 3408 WerFault.exe 81 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3408 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe 81 PID 2064 wrote to memory of 3408 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe 81 PID 2064 wrote to memory of 3408 2064 407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe"C:\Users\Admin\AppData\Local\Temp\407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe"C:\Users\Admin\AppData\Local\Temp\407e3a7893464719061c167066b9c6955a73a1f58281ab9b55323bbb123a0544.exe"2⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 5403⤵
- Program crash
PID:4124
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3408 -ip 34081⤵PID:4224