Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe
Resource
win10v2004-20230915-en
General
-
Target
7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe
-
Size
6KB
-
MD5
d87bc97ae54ef40f7155c33d3ade5107
-
SHA1
4215242e1291175a1b94d52c65fffae95e94bff7
-
SHA256
7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df
-
SHA512
146d2b337287cc3e0841382e3d44a68affadefa7d5d9df80d600a56085140139a25349f872d78695c5a42941e03ac4003298874302a838259aedaa69b2b0ee15
-
SSDEEP
48:S2nbt0S4FVgCp471Ib4Fc/38+N7DYocHa23WlTpebVetFygFI5a2oxdVoZiG/9ut:H0mIGnFc/38+N4ZHJWSY9FI5Wqfx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1148 1712 7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe 28 PID 1712 wrote to memory of 1148 1712 7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe 28 PID 1712 wrote to memory of 1148 1712 7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe"C:\Users\Admin\AppData\Local\Temp\7b499fa7c1624911c47af30450d3261b3cace5d4a767ca90c9380fa8668769df.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1712 -s 322⤵PID:1148
-