Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13/07/2023, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe
Resource
win10v2004-20230703-en
General
-
Target
977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe
-
Size
5.8MB
-
MD5
6e6c80c7ed29dc3a27b8e6263aa2e440
-
SHA1
8e86476071b694a3b1d392931cbb57ea45e8f14f
-
SHA256
977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a
-
SHA512
d55a7fa5551e9080a30c3e21fd0ac0856a999167d6628b372e42a544c35bf0a9ed8568cddfd21ea81c304300f37a91585a9cdc193d07aad7f7c12f26207f2ded
-
SSDEEP
12288:+Y9yVItQEUy9OzNq9bcD3wxQ2kROClnMFT1FezEFvV3iNgaKiMvDlOCF/3viDFe7:QYQYqWQ29TzvVogBh3KMg
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1644 2072 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1644 2072 977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe 28 PID 2072 wrote to memory of 1644 2072 977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe 28 PID 2072 wrote to memory of 1644 2072 977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe 28 PID 2072 wrote to memory of 1644 2072 977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe"C:\Users\Admin\AppData\Local\Temp\977d1c0defaf0073a0b525313a4a128f3d9c4d44b369388ed0dc96ae8ceb131a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 4882⤵
- Program crash
PID:1644
-