Analysis
-
max time kernel
111s -
max time network
176s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-10-2022 22:19
Static task
static1
Behavioral task
behavioral1
Sample
bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe
Resource
win7-20220812-en
General
-
Target
bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe
-
Size
495KB
-
MD5
f617dc0ef20d4e72ffd6bc77dd369015
-
SHA1
0d42af92a721dfb973da334263db1171924cb7b6
-
SHA256
bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7
-
SHA512
0b39e90dadf556df5a74e8eb1cc1ebd5b2263a3f3e42d9430bb61446aac2df8beced2df3f00840d92ed05954c90043cce80d3a0c58a9d804136c057bbffee08c
-
SSDEEP
12288:2iT5fZPOxHPJHAVwGoh7tfw1h8BvgcNW9eoRmotAG8TJ1k:2iT5fZwxHigBfw1h8KcPemotm
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 -
Program crash 1 IoCs
pid pid_target Process procid_target 5024 3744 WerFault.exe 66 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66 PID 1760 wrote to memory of 3744 1760 bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe"C:\Users\Admin\AppData\Local\Temp\bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exeC:\Users\Admin\AppData\Local\Temp\bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe2⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 7123⤵
- Program crash
PID:5024
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\bd26b88c1d59a173c2d183fa24b40d5452685a4686d52acab8f6d1f6b8a1f2d7.exe.log
Filesize789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee