Analysis
-
max time kernel
89s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:05
Static task
static1
Behavioral task
behavioral1
Sample
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe
Resource
win10v2004-20221111-en
General
-
Target
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe
-
Size
143KB
-
MD5
42b74b0dde8c7313e2403b7a93dd4941
-
SHA1
1b8566d4aca70eb7ee00896188c3b5691cfb8204
-
SHA256
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc
-
SHA512
c188ea28e0b64303ddfbdb2f24f2b9997b923989e621289f7a20ea69bf96a5f85290526fdf51d5185e3b4008e399fbcd133c76bc2d0fd0e438be94c96ae10aff
-
SSDEEP
3072:iO2T8atgFx6Bj0j1IhD07cDxyy1rbFo8eAvkdQM:32T8Vx6BAIBh6TXd3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exedescription pid process target process PID 1504 set thread context of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1080 1924 WerFault.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exepid process 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exeexplorer.exedescription pid process target process PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 1504 wrote to memory of 688 1504 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 688 wrote to memory of 1924 688 5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe explorer.exe PID 1924 wrote to memory of 1080 1924 explorer.exe WerFault.exe PID 1924 wrote to memory of 1080 1924 explorer.exe WerFault.exe PID 1924 wrote to memory of 1080 1924 explorer.exe WerFault.exe PID 1924 wrote to memory of 1080 1924 explorer.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe"C:\Users\Admin\AppData\Local\Temp\5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe"C:\Users\Admin\AppData\Local\Temp\5ec6b178662b0732ac291297f16eb91cd57ddabac303a425236ace270bb0c0bc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2324⤵
- Program crash
PID:1080
-
-
-