Analysis
-
max time kernel
31s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-04-2023 19:25
Behavioral task
behavioral1
Sample
4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe
Resource
win10v2004-20230220-en
General
-
Target
4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe
-
Size
1.2MB
-
MD5
8ded0a8b1e5af185aea61ec821c68814
-
SHA1
e02daa278457d8e44db8b5064645fb700ec8758e
-
SHA256
4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f
-
SHA512
8a4c18c2d87fcdbf3c43d425bb2b6bc671e0c8eaeced689b30fb8323fc6f12e884b09345dcfbcf119bf6d31b0e7b9d80acd5924c58a14e1d79d7b5f3d93e8a9f
-
SSDEEP
24576:e57tlWr1z74/kYkQkl91IpHmsryfTFuKiUR5Z3F1q2:emH4csGsSZj3F7
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1112 1048 WerFault.exe 4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exepid process 1048 4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exedescription pid process target process PID 1048 wrote to memory of 1112 1048 4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe WerFault.exe PID 1048 wrote to memory of 1112 1048 4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe WerFault.exe PID 1048 wrote to memory of 1112 1048 4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe WerFault.exe PID 1048 wrote to memory of 1112 1048 4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe"C:\Users\Admin\AppData\Local\Temp\4ddc01b122a8f380425aef714fa75aa56a1cbb965452d5a308fb47bdf02d395f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 1882⤵
- Program crash