Analysis
-
max time kernel
52s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-11-2022 00:41
Static task
static1
Behavioral task
behavioral1
Sample
d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe
Resource
win10-20220812-en
windows10-1703-x64
3 signatures
150 seconds
General
-
Target
d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe
-
Size
325KB
-
MD5
992322cfd3f428dc5093a493ef0d4f81
-
SHA1
bff461bdb625fc3c981dc86d36f487c6501a440f
-
SHA256
d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844
-
SHA512
3bd22b1a503f0fd8a52adf217caee8bfc303d6bf18424a19df696bbe21adaa21bfc681b9027acbd493ac7b008aaed56eac0fdea5b1aed327d0aa30952a542fce
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 -
Program crash 1 IoCs
pid pid_target Process procid_target 1460 4760 WerFault.exe 68 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3004 wrote to memory of 4884 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 66 PID 3004 wrote to memory of 4884 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 66 PID 3004 wrote to memory of 4884 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 66 PID 3004 wrote to memory of 4892 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 67 PID 3004 wrote to memory of 4892 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 67 PID 3004 wrote to memory of 4892 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 67 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68 PID 3004 wrote to memory of 4760 3004 d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe"C:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exeC:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe2⤵PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exeC:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe2⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exeC:\Users\Admin\AppData\Local\Temp\d861c524f88012db48e4a8cb12242ecd66c22508f270991fa1d20f5b29f7a844.exe2⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1523⤵
- Program crash
PID:1460
-
-