Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 19:25
Behavioral task
behavioral1
Sample
2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe
Resource
win10v2004-20220812-en
General
-
Target
2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe
-
Size
4.3MB
-
MD5
77caa62b56dcfc01172d062293510047
-
SHA1
8d16b125862f433bc4139e26a7c990113f228485
-
SHA256
2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8
-
SHA512
9ce0cc7e8d1f9c67a832782f8f6a0e4c792e283e61621c145a23396bc720d28a9e887dd3c52071cffd993fbb83f16467846f3538f66ca32efeef8f59de492ca0
-
SSDEEP
98304:D1ijlRnWUcXlbs9UDyKmA2wYEJEfO2FQQRpqTuzoBPD1OSc:pIK1I9UDz2wNiZ+TJD8
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1144 1720 WerFault.exe 2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exedescription pid process target process PID 1720 wrote to memory of 1144 1720 2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe WerFault.exe PID 1720 wrote to memory of 1144 1720 2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe WerFault.exe PID 1720 wrote to memory of 1144 1720 2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe WerFault.exe PID 1720 wrote to memory of 1144 1720 2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe"C:\Users\Admin\AppData\Local\Temp\2456e205c554b139997b729ac1dd14e4b27913f403a1271808c022c9d18f9ad8.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 2322⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1144-60-0x0000000000000000-mapping.dmp
-
memory/1720-54-0x00000000762B1000-0x00000000762B3000-memory.dmpFilesize
8KB
-
memory/1720-55-0x0000000000400000-0x0000000001A0C000-memory.dmpFilesize
22.0MB
-
memory/1720-56-0x0000000000400000-0x0000000001A0C000-memory.dmpFilesize
22.0MB
-
memory/1720-57-0x0000000000400000-0x0000000001A0C000-memory.dmpFilesize
22.0MB
-
memory/1720-59-0x0000000000400000-0x0000000001A0C000-memory.dmpFilesize
22.0MB
-
memory/1720-61-0x0000000000400000-0x0000000001A0C000-memory.dmpFilesize
22.0MB