Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2023, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy______________________________________________pdf.exe
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payment Copy______________________________________________pdf.exe
Resource
win10v2004-20230220-en
1 signatures
150 seconds
General
-
Target
Payment Copy______________________________________________pdf.exe
-
Size
600KB
-
MD5
4c913c3ad1bdcd3b73c1a00f420333a4
-
SHA1
6df149f36a3c18447aba2525ea23641794c0be6d
-
SHA256
86ad5c7ca58c6f796cfb64a977f1e31ab1e318dc4efbb505b3ac8b5e1d90775e
-
SHA512
aae1fc6272c05234ba34c93716cb2d8d32ef5ad7f9cefa0e73c30a90421373869d152cab1f654db4ff1fe886113aa57b708c559ecc769a404ec654be53ceb440
-
SSDEEP
12288:6VTmclFiW2KuyNgi8gmDbnRnmwOAw8W9MW0edSfR:6V39EgmDbtVOaW
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1624 1444 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1624 1444 Payment Copy______________________________________________pdf.exe 27 PID 1444 wrote to memory of 1624 1444 Payment Copy______________________________________________pdf.exe 27 PID 1444 wrote to memory of 1624 1444 Payment Copy______________________________________________pdf.exe 27 PID 1444 wrote to memory of 1624 1444 Payment Copy______________________________________________pdf.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Copy______________________________________________pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy______________________________________________pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 6882⤵
- Program crash
PID:1624
-