Analysis
-
max time kernel
110s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 23:09
Behavioral task
behavioral1
Sample
662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe
-
Size
11.4MB
-
MD5
d37c36c2d709f18d323acb11802edbde
-
SHA1
55c89e6d028377092a2898f5cd990015fd133e1f
-
SHA256
662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379
-
SHA512
5ab2669ac768f72f87ecb52967dc0c2348da61c6bbb6680d3a0f34ab6a6dfec239c5d0fccc0350f1a6cc6e968b10e9e6901586403da594c01cfe323b17427e2d
-
SSDEEP
196608:Mj4ujCOlxz8KvBvTi/p5RTxHDpX++lpxdG7fw5BnS8n5vpI:Mj4qxwKpvGx5RFHlX++lpxdGkfSW5v
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2504-4-0x0000000000400000-0x00000000019CF000-memory.dmp vmprotect behavioral1/memory/2504-9-0x0000000000400000-0x00000000019CF000-memory.dmp vmprotect behavioral1/memory/2504-41-0x0000000000400000-0x00000000019CF000-memory.dmp vmprotect -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 2504 WerFault.exe 17 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2032 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe 27 PID 2504 wrote to memory of 2032 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe 27 PID 2504 wrote to memory of 2032 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe 27 PID 2504 wrote to memory of 2032 2504 662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe"C:\Users\Admin\AppData\Local\Temp\662627441781b09558e9210c0db729c83af0dd7be2a5323b7cc6a40036af2379.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2922⤵
- Program crash
PID:2032
-