Analysis
-
max time kernel
45s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:00
Behavioral task
behavioral1
Sample
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe
Resource
win10v2004-20220901-en
General
-
Target
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe
-
Size
45KB
-
MD5
bf83f96bd78a43fa3abc36ab55d61b5f
-
SHA1
3468945288128014b236b47fd55f35757688eaa3
-
SHA256
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979
-
SHA512
bcad6f9ae4c1facb02f5c33399e27427d4834d5cc0266e9fc540b11fcfb6ce945a4a194c0488b33914447ed1a4fe32cca08b2bf7971e50c7147bdc1bc4195bff
-
SSDEEP
768:hCCqjLQSY6Hna6pVA4jOOMOcokE9CZDkYneJldC9cIheVI6kcsIB:ICq/Q5ma4wLOcokqwkgeLdCi2eV0I
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exedescription pid process target process PID 948 set thread context of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1900 948 WerFault.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exepid process 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exedescription pid process target process PID 948 wrote to memory of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe PID 948 wrote to memory of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe PID 948 wrote to memory of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe PID 948 wrote to memory of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe PID 948 wrote to memory of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe PID 948 wrote to memory of 988 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe PID 988 wrote to memory of 1388 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe Explorer.EXE PID 948 wrote to memory of 1900 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe WerFault.exe PID 948 wrote to memory of 1900 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe WerFault.exe PID 948 wrote to memory of 1900 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe WerFault.exe PID 948 wrote to memory of 1900 948 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe WerFault.exe PID 988 wrote to memory of 1388 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe Explorer.EXE PID 988 wrote to memory of 1388 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe Explorer.EXE PID 988 wrote to memory of 1388 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe Explorer.EXE PID 988 wrote to memory of 1388 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe Explorer.EXE PID 988 wrote to memory of 1388 988 897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe"C:\Users\Admin\AppData\Local\Temp\897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exeC:\Users\Admin\AppData\Local\Temp\897f48e0b55581fb988a79e9426f793cc743b39b614b4d125699b885b6569979.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 923⤵
- Program crash
PID:1900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/988-54-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/988-56-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/988-57-0x00000000004074ED-mapping.dmp
-
memory/988-59-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/988-60-0x0000000076961000-0x0000000076963000-memory.dmpFilesize
8KB
-
memory/988-62-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/988-63-0x0000000000020000-0x0000000000031000-memory.dmpFilesize
68KB
-
memory/1388-64-0x000000007EFC0000-0x000000007EFC6000-memory.dmpFilesize
24KB
-
memory/1900-61-0x0000000000000000-mapping.dmp