Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 14:26
Behavioral task
behavioral1
Sample
1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe
Resource
win10v2004-20220901-en
General
-
Target
1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe
-
Size
553KB
-
MD5
0dc2d4f675f414934ae9f7292d385360
-
SHA1
18fd5701ff8d302eee338fce10213fa1e59a632a
-
SHA256
1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb
-
SHA512
aa1bbd4f4fd1f88ce9b40c1a0328aa75d34aa97239c9d8571e1277a48051fa6c1e013e4e21dc92aed13c1e68514436dc870f8f5b21da895bc75d63d367e84f26
-
SSDEEP
12288:al6zC2R5u6Svh6rsu84ZaBLEOa0RFm9t4b1rV43Vat:q6zCsXSvSsNSaSsYt4bX4lat
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1260 1632 WerFault.exe 1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exedescription pid process target process PID 1632 wrote to memory of 1260 1632 1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe WerFault.exe PID 1632 wrote to memory of 1260 1632 1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe WerFault.exe PID 1632 wrote to memory of 1260 1632 1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe WerFault.exe PID 1632 wrote to memory of 1260 1632 1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe"C:\Users\Admin\AppData\Local\Temp\1ca51d745489dfbfa5ed1bae6d13851038422fc0f3e3ee311e36e2393d21f2fb.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 922⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1260-54-0x0000000000000000-mapping.dmp