Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2023, 03:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d13b979b1bd8830f093bb9aab1c3f80e.exe
Resource
win7-20230712-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d13b979b1bd8830f093bb9aab1c3f80e.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
d13b979b1bd8830f093bb9aab1c3f80e.exe
-
Size
1024KB
-
MD5
d13b979b1bd8830f093bb9aab1c3f80e
-
SHA1
257d663cbcf39d0fe1315c9cbbd1a13eec5ecabe
-
SHA256
d147723c89539aa5c4cc1ffc41478111a4c058bee7c0faa73ef3c77294a997bb
-
SHA512
db716b288d0b31649362a124f820523998804f6bbb5006466e9af84b3aa0946f51fd9976daa2f7067554fc28ed832f7f6b1b3695789ebaf01d5769c9c68c30cb
-
SSDEEP
24576:ROCEhCCa2ruQpGU0WZnQNXeicIIKQ/CFO:ROC5NWZnQNXed1/CF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 3772 d13b979b1bd8830f093bb9aab1c3f80e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3772 wrote to memory of 1484 3772 d13b979b1bd8830f093bb9aab1c3f80e.exe 84 PID 3772 wrote to memory of 1484 3772 d13b979b1bd8830f093bb9aab1c3f80e.exe 84 PID 3772 wrote to memory of 1484 3772 d13b979b1bd8830f093bb9aab1c3f80e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d13b979b1bd8830f093bb9aab1c3f80e.exe"C:\Users\Admin\AppData\Local\Temp\d13b979b1bd8830f093bb9aab1c3f80e.exe"1⤵
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SYSTEM32\WerFault.exeWerFault2⤵PID:1484
-