Analysis
-
max time kernel
44s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 17:23
Static task
static1
Behavioral task
behavioral1
Sample
308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe
Resource
win10v2004-20220812-en
General
-
Target
308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe
-
Size
713KB
-
MD5
64220a852ef55ede43f68f0919b56530
-
SHA1
3b727e0058309199ac97fec1a79802dc654f9019
-
SHA256
308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217
-
SHA512
0b3c60d2109b14985886b6bfb468713e27afc3387455973ad71d81a1ed564a86d252e8856a0fbb06f0618d41d14ce38824e45d49f3eec5c6af7ddb1d93b8ee4e
-
SSDEEP
12288:mtZdx6/zcy8Q8S24TJzMi5mdDWimPCrJhVgQn8m:mX2/n8of5mdaimqrXmQ8m
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1692 1744 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1252 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 27 PID 1744 wrote to memory of 1252 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 27 PID 1744 wrote to memory of 1252 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 27 PID 1744 wrote to memory of 1252 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 27 PID 1744 wrote to memory of 1692 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 28 PID 1744 wrote to memory of 1692 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 28 PID 1744 wrote to memory of 1692 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 28 PID 1744 wrote to memory of 1692 1744 308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe"C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217.exeTUXJ2⤵PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 922⤵
- Program crash
PID:1692
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\308e0391849cecb559bbb21dd8db4309d0146dd0fa27d7bfd0e08098e4a75217TUXJ
Filesize4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232