Analysis
-
max time kernel
11s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18-04-2023 07:57
Static task
static1
Behavioral task
behavioral1
Sample
FEMTALITY.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
FEMTALITY.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
FEMTALITY.exe
-
Size
594.0MB
-
MD5
c932e7b2647518934cea73176932330e
-
SHA1
133cee32a6df737b1c1211929ed43c866eb8cde4
-
SHA256
f01b944262a8d04fb207da7a97c309d1bc4536700f6a3fb122952b8386b8af39
-
SHA512
fbf0ba0489586f7b3f7b93b6e1e79342b635854ac320982f1cefbc4e30ce7c189ebecf59d09817a3f7cf6f057e955506a32c7500655fcd4f9c4b81e98c77171b
-
SSDEEP
12582912:EvJwuVsdEsWWcmwgjiqRqTBB3aYUYVfMGK9OZ2:6tVW3cUsHUGK9q2
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1932 1740 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 FEMTALITY.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1932 1740 FEMTALITY.exe 28 PID 1740 wrote to memory of 1932 1740 FEMTALITY.exe 28 PID 1740 wrote to memory of 1932 1740 FEMTALITY.exe 28 PID 1740 wrote to memory of 1932 1740 FEMTALITY.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\FEMTALITY.exe"C:\Users\Admin\AppData\Local\Temp\FEMTALITY.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 6522⤵
- Program crash
PID:1932
-