Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe
Resource
win10v2004-20221111-en
General
-
Target
432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe
-
Size
84KB
-
MD5
11c3fe8da9b6b9b5c70f094e4a6f342d
-
SHA1
c83890cd03c9da5dfc250203ce7c446e0128c3cb
-
SHA256
432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20
-
SHA512
a9e82ba7d375b3a7a7f1800de923e037bcbdc9927c740cc7f55fe39414a104256e182da2178e383337b433a5d79f32bb451e6ea4b61d015046da0d1e12a345bd
-
SSDEEP
768:I3ncJu5hBXF2pmiq2V41xNmAFgGyi4XwP13GT9W28z/zMp5xAFiE3s:I3cJu5hBVWq2kN6LXwPVGT9lgA5gs
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1688 1256 WerFault.exe 15 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\Main 432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Images = "yes" 432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1920 432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe 1920 432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1256 1920 432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe"C:\Users\Admin\AppData\Local\Temp\432bff5a79da4c472e15cd4395ddb1afbd73122062981f72626dc83f9be8cf20.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1256 -s 18042⤵
- Program crash
PID:1688
-