Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe
Resource
win10v2004-20220812-en
General
-
Target
50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe
-
Size
64KB
-
MD5
637974304ac98440efcfb71209667518
-
SHA1
aa1dbab2a7e052cc918d5b459d64cfd49acecafe
-
SHA256
50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae
-
SHA512
69fe2248516f4a0b4ffaceb62b3fcd85844d4b4b7f2f1d9193be06349508a8ed81cb91feec0b3f04df0941c6409afb32c3ee1fc52be4bfbc4cf7eb8fea8b8998
-
SSDEEP
768:VRmfk2fKhaXF6ZUN4UyIKuIQy7B3B4PTF/YjjtyOsS0Qko+OjgulxRPeUSJ:zmfvK48xLXQk3B++jsOsS0Q7jgunRmUA
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1416 900 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 900 wrote to memory of 1416 900 50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe 27 PID 900 wrote to memory of 1416 900 50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe 27 PID 900 wrote to memory of 1416 900 50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe 27 PID 900 wrote to memory of 1416 900 50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe"C:\Users\Admin\AppData\Local\Temp\50f2899b8c60dc0d3fd3df40d9c76a8458156caa630f76f885bcd6d4d7ff7fae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 362⤵
- Program crash
PID:1416
-