Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 23:38
Static task
static1
Behavioral task
behavioral1
Sample
8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe
Resource
win10v2004-20220901-en
General
-
Target
8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe
-
Size
668KB
-
MD5
080ea8a08f3a363d9efa316618417d50
-
SHA1
986129d85680c902818d0c323ce9740d7d1f6463
-
SHA256
8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230
-
SHA512
a50a3f55bd4f9af7515d1a50a5129f6fb5da4441b27156b65cd18b7cc13045fbf86e9d78ec4ad466fd47f0d4c95bc8868ffa75f2a08a0db2806f196a2ddecf81
-
SSDEEP
6144:ppqoa8a/qcZI6iLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebeqJ/blUHC3Nhca:pp9OIRGAtkCP4cejfMSK3CGYn
Malware Config
Signatures
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1096-55-0x0000000000400000-0x00000000004C5000-memory.dmp autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1212 1096 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1212 1096 8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe 28 PID 1096 wrote to memory of 1212 1096 8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe 28 PID 1096 wrote to memory of 1212 1096 8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe 28 PID 1096 wrote to memory of 1212 1096 8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe"C:\Users\Admin\AppData\Local\Temp\8d9a12f8954d62b5c25f4551250763fb9a398b29f99ddc25c13ec10f5a1df230.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 2282⤵
- Program crash
PID:1212
-