Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
05-10-2023 19:23
Static task
static1
Behavioral task
behavioral1
Sample
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe
-
Size
1023KB
-
MD5
77650bc339c9c420709ca447465f164b
-
SHA1
623362fa1b8b25eb5e072db8f873486392cb464d
-
SHA256
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6
-
SHA512
180f90f46b2ffe746bdd554b55987624f0e5c18b381dc5a43a18362e4403a155d8c1753b6038c9792e1d0bf450995cba830f5b653508491763e9a1a99605d4bb
-
SSDEEP
24576:3JorhygMajIQREzeqwEhjL5a5iT/8oTZfMy4:5SrM8HCL5Rb8oSy4
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exedescription pid process target process PID 2644 set thread context of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2628 2748 WerFault.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exedescription pid process Token: SeDebugPrivilege 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exefa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exedescription pid process target process PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2644 wrote to memory of 2748 2644 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe PID 2748 wrote to memory of 2628 2748 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe WerFault.exe PID 2748 wrote to memory of 2628 2748 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe WerFault.exe PID 2748 wrote to memory of 2628 2748 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe WerFault.exe PID 2748 wrote to memory of 2628 2748 fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exeC:\Users\Admin\AppData\Local\Temp\fa7ed15708d988e7f69b5628db9481816052efea29e93f1bd274a1d76006aee6exe_JC.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 1643⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2644-8-0x0000000002060000-0x00000000020AC000-memory.dmpFilesize
304KB
-
memory/2644-21-0x00000000741C0000-0x00000000748AE000-memory.dmpFilesize
6.9MB
-
memory/2644-0-0x00000000741C0000-0x00000000748AE000-memory.dmpFilesize
6.9MB
-
memory/2644-3-0x0000000004CB0000-0x0000000004CF0000-memory.dmpFilesize
256KB
-
memory/2644-4-0x0000000000460000-0x00000000004A8000-memory.dmpFilesize
288KB
-
memory/2644-5-0x0000000000800000-0x0000000000846000-memory.dmpFilesize
280KB
-
memory/2644-6-0x0000000002020000-0x0000000002054000-memory.dmpFilesize
208KB
-
memory/2644-7-0x0000000004CB0000-0x0000000004CF0000-memory.dmpFilesize
256KB
-
memory/2644-2-0x00000000741C0000-0x00000000748AE000-memory.dmpFilesize
6.9MB
-
memory/2644-1-0x00000000000D0000-0x00000000001D6000-memory.dmpFilesize
1.0MB
-
memory/2748-12-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-11-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-13-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-14-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-15-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2748-18-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-20-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/2748-9-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB