Analysis
-
max time kernel
140s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-05-2023 05:22
Behavioral task
behavioral1
Sample
a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe
Resource
win10v2004-20230220-en
General
-
Target
a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe
-
Size
1.5MB
-
MD5
4b7b14b020e2b9a8923e7df7a68d0317
-
SHA1
89b395af199957f6a57cc5b2b03bf09db921935c
-
SHA256
a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b
-
SHA512
2ce81a25d1db77f2048f7f74c58c70d6743523ae7f5836bcc2cbe731faeabc197b7b549a90055a6639b8b8cb31fc0c6838aba8079dc9564664cc663a52d801d7
-
SSDEEP
24576:NbeN2iSIJBbwO2fiGqNh6/omtv18inYhioDg1kJVcYSGP:w2iSqEJRqNOom8inqQ1sl
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1184 1240 WerFault.exe a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exepid process 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exedescription pid process target process PID 1240 wrote to memory of 1184 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe WerFault.exe PID 1240 wrote to memory of 1184 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe WerFault.exe PID 1240 wrote to memory of 1184 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe WerFault.exe PID 1240 wrote to memory of 1184 1240 a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe"C:\Users\Admin\AppData\Local\Temp\a9c3ff2dd339f0d40f47bcdf945f257a33a296b74aa601241b0dfc7f21db6f7b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 3482⤵
- Program crash
PID:1184
-