Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe
Resource
win10v2004-20230915-en
General
-
Target
b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe
-
Size
1.0MB
-
MD5
bef60865194e5ce13d82b5fea28904a9
-
SHA1
100cad287dba6c2860e8579d4f24f1562365a407
-
SHA256
b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5
-
SHA512
98338495f3cd8592532a3f9c130f80b556122f5e94168585ee477b89a862e1dfa92ee45172a856caeb455a9912ac2877949ba6c7b897170471ec44c54c857713
-
SSDEEP
24576:nPgBdM6kUzfikRvfts7qSA+8aPCf17C7BUJbXajCJAAJquxsbO:nPgZzdf5CCNyC2oquM
Malware Config
Signatures
-
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
pid Process 4604 b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4992 4604 b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe 85 PID 4604 wrote to memory of 4992 4604 b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe 85 PID 4604 wrote to memory of 4992 4604 b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe"C:\Users\Admin\AppData\Local\Temp\b84410aac704138ccc7bf9c65c90722bc284b4b0bd2a1082f6c48e7f68c12dd5.exe"1⤵
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SYSTEM32\WerFault.exeWerFault2⤵PID:4992
-