Analysis
-
max time kernel
367s -
max time network
878s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
23/09/2023, 20:25
Behavioral task
behavioral1
Sample
Unconfirmed 226848.exe
Resource
win7-20230831-en
22 signatures
1200 seconds
General
-
Target
Unconfirmed 226848.exe
-
Size
2.0MB
-
MD5
7177f798d7ec4dc325205fdd9c5fa753
-
SHA1
accb343313902a997bfa5028fa27da69f0cc820a
-
SHA256
a914d414ff94b74b685a180608462ff13dcae3586da797c34a0eb1b02dabf828
-
SHA512
5548a3c96175e9f674c07cb67f59ad800b43766b0e075b1f245b53f924fb024157789e4d6cb6490dc9b70c3015731417863c39d9c41f0eb1a161c5d00925dc50
-
SSDEEP
49152:2FP13ycDr/sbG33MZ9w+2/+F6dtrYvVOPyUgPq:2T3y/b0H/+F6deGXd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2532-0-0x0000000000400000-0x0000000000FDB000-memory.dmp upx behavioral2/memory/2532-12-0x0000000000400000-0x0000000000FDB000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Unconfirmed 226848.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2532 Unconfirmed 226848.exe 2532 Unconfirmed 226848.exe 2532 Unconfirmed 226848.exe 2532 Unconfirmed 226848.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unconfirmed 226848.exe"C:\Users\Admin\AppData\Local\Temp\Unconfirmed 226848.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:2532
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\b2c71f7031004684b3cff87df3c74b74 /t 2528 /p 25321⤵PID:5096