Analysis
-
max time kernel
133s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe
Resource
win10v2004-20220812-en
General
-
Target
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe
-
Size
426KB
-
MD5
9174dc541108b06d7a4e201b34e70e68
-
SHA1
95421cecceff6b2a04f78b7167d5d8e4cdbe2f73
-
SHA256
ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b
-
SHA512
7dd56a9b09dd709b65f77d032cf6318d0e41bc5c2642d0a0d48ee2efd1ee5ec2a42a3fdc11649346ca278b61ec1406812f23ef750cb21ad8d934dca9a152e2a7
-
SSDEEP
6144:NH4R4IvKwrAcdOVtGbHPwPwouoU2V2zTpxyN90vElFsa:NH4R4IvKkA+OabHml2Py90CCa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4384 set thread context of 4220 4384 ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe 79 -
Program crash 1 IoCs
pid pid_target Process procid_target 1648 4220 WerFault.exe 79 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4384 wrote to memory of 4220 4384 ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe 79 PID 4384 wrote to memory of 4220 4384 ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe 79 PID 4384 wrote to memory of 4220 4384 ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe 79 PID 4384 wrote to memory of 4220 4384 ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe"C:\Users\Admin\AppData\Local\Temp\ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe"C:\Users\Admin\AppData\Local\Temp\ea8ca46b73e17e7088f61f43ecb18de2eafb3cbf52e1c9020c5d322f7f451f3b.exe"2⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 5043⤵
- Program crash
PID:1648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4220 -ip 42201⤵PID:4484