Analysis
-
max time kernel
36s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-08-2022 20:24
Behavioral task
behavioral1
Sample
e0d959b912b9da37f1fc2dea441ad15e.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
e0d959b912b9da37f1fc2dea441ad15e.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
e0d959b912b9da37f1fc2dea441ad15e.exe
-
Size
114KB
-
MD5
e0d959b912b9da37f1fc2dea441ad15e
-
SHA1
049e24b0b337491332223208f0de575072aa2009
-
SHA256
c911d82a6a049440a003cc9284f9d6b202240e3ea28aed8c625c6cd79173781a
-
SHA512
6a00ae63ca534c92cdc133ef7092684a751b435c19ca9bc02adff5e60e27f8272ffb7f1fd8267236c363016138aa573e840cf099cd5ce39284852701a1a4ddef
-
SSDEEP
1536:nPWhJzhiCcZZr6WDurilmw9BgjKu1sPPxaS4jqY:PWDgCeDxlPwV16PkS4jqY
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/540-56-0x0000000001220000-0x000000000123F000-memory.dmp family_hermeticwiper -
HermeticWiper
HermeticWiper is a partition-corrupting malware used in cyberattacks against Ukrainian organizations.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1736 540 WerFault.exe 19 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 540 wrote to memory of 1736 540 e0d959b912b9da37f1fc2dea441ad15e.exe 27 PID 540 wrote to memory of 1736 540 e0d959b912b9da37f1fc2dea441ad15e.exe 27 PID 540 wrote to memory of 1736 540 e0d959b912b9da37f1fc2dea441ad15e.exe 27 PID 540 wrote to memory of 1736 540 e0d959b912b9da37f1fc2dea441ad15e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0d959b912b9da37f1fc2dea441ad15e.exe"C:\Users\Admin\AppData\Local\Temp\e0d959b912b9da37f1fc2dea441ad15e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 1162⤵
- Program crash
PID:1736
-