Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
26-09-2023 15:52
Static task
static1
Behavioral task
behavioral1
Sample
ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe
-
Size
5.5MB
-
MD5
a92a908cae30b9b020244bedf61a1dd4
-
SHA1
a45bf660ae267b2c8027327b2b97c61faa88d9ae
-
SHA256
ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
-
SHA512
beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
SSDEEP
98304:pHrMX3ZbN6mocwdMpXYI6A2XwY0o7r5QBa2lAo3WTsKVnd/9lSD/WFIxUBzqHy:1MnZZPocwGpoRRXwY9rb2moBKVd/9lEJ
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 2500 2288 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exedescription pid process target process PID 2288 wrote to memory of 2500 2288 ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe WerFault.exe PID 2288 wrote to memory of 2500 2288 ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe WerFault.exe PID 2288 wrote to memory of 2500 2288 ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe WerFault.exe PID 2288 wrote to memory of 2500 2288 ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe WerFault.exe
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1561⤵
- Program crash
PID:2500
-
C:\Users\Admin\AppData\Local\Temp\ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe"C:\Users\Admin\AppData\Local\Temp\ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288