Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14-02-2023 18:38
Behavioral task
behavioral1
Sample
acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe
Resource
win10v2004-20220901-en
General
-
Target
acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe
-
Size
2.1MB
-
MD5
0497c1b3baaec5df94f07727695d9808
-
SHA1
12283da2b8003c879b1b8fed10aa6f0bb7b95705
-
SHA256
acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d
-
SHA512
12c9312f40bf79b30f88657d128eded98236b778155d34053f3da21dd51d16fb493f1da87dc9201f6823478a6129480d726d35e5e1201159e5259f6272e0a266
-
SSDEEP
49152:9DpRBaGJt4IvANN2msZC+wKXtQybUVyYczUIW6OH2YADu9VoEF:91R4iAEmsZJwKX7lmv6u9eE
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 272 912 WerFault.exe acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exepid process 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exedescription pid process target process PID 912 wrote to memory of 272 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe WerFault.exe PID 912 wrote to memory of 272 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe WerFault.exe PID 912 wrote to memory of 272 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe WerFault.exe PID 912 wrote to memory of 272 912 acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe"C:\Users\Admin\AppData\Local\Temp\acf75616cefb674d1233c8b730263d788e4755c413c2405b046c275586f3cd7d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 912 -s 3282⤵
- Program crash
PID:272
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/272-60-0x0000000000000000-mapping.dmp
-
memory/912-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/912-55-0x0000000000400000-0x0000000000A90000-memory.dmpFilesize
6.6MB
-
memory/912-56-0x0000000000400000-0x0000000000A90000-memory.dmpFilesize
6.6MB
-
memory/912-57-0x0000000000400000-0x0000000000A90000-memory.dmpFilesize
6.6MB
-
memory/912-58-0x0000000000400000-0x0000000000A90000-memory.dmpFilesize
6.6MB
-
memory/912-59-0x0000000000400000-0x0000000000A90000-memory.dmpFilesize
6.6MB
-
memory/912-61-0x0000000000400000-0x0000000000A90000-memory.dmpFilesize
6.6MB