Analysis
-
max time kernel
93s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 22:25
Static task
static1
Behavioral task
behavioral1
Sample
a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe
Resource
win10v2004-20220812-en
General
-
Target
a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe
-
Size
140KB
-
MD5
7b017d9e9278bb06341e5624d1d99e8b
-
SHA1
e3ed6d9b49733c8061de9644be8606569f4ceb71
-
SHA256
a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa
-
SHA512
45adb326a1d8fbac1a3ffc061ec6b3963bc76ad5e622ba20da28bfb72a128b71f93671e7e6507123355426c78b2f45646b814da891177d12cba0c05ade1c3e85
-
SSDEEP
3072:xrsj3W1rVEYk8NDQMbPcUVlffIL7+4NaskiidoAD:wQL9NJQUV63adoAD
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4916-136-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4916-140-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4916-139-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral2/memory/4916-141-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4304 5000 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4916 5000 a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe 82 PID 5000 wrote to memory of 4916 5000 a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe 82 PID 5000 wrote to memory of 4916 5000 a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe"C:\Users\Admin\AppData\Local\Temp\a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\a0bbb03461379c727d2bf3a8de3b429b2a87c124b0d56da7c1dc832947f9f8aa.exe?2⤵PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 4602⤵
- Program crash
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5000 -ip 50001⤵PID:4204