Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe
Resource
win10v2004-20230915-en
General
-
Target
46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe
-
Size
1.2MB
-
MD5
0807974f1d38a15397f3b5c102ece74b
-
SHA1
5ecc71351c4f56d9adc5581ade4aea0206ca009b
-
SHA256
46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee
-
SHA512
d425427f32e9f307c03382b53183924b46bda7db6300d8b0430d1eb15ccc82bd4b8ec5f285101609ed4a571fb6748561973b04382d5c37779b572db6c971687b
-
SSDEEP
24576:n74crpNHAs6ry4pL4hlVdF25Bi47dFg965HNsWOf3lW9wTxiwjLVmJG:74crzHAZxp0h3gM47qSeWOf3WwMwQJG
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 3064 3052 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3020 wrote to memory of 3052 3020 46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe 29 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32 PID 3052 wrote to memory of 3064 3052 AppLaunch.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe"C:\Users\Admin\AppData\Local\Temp\46dc4cbed6cf12ca135e5836feaa130bfdda31513669cb34e4be103ce88a66ee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2003⤵
- Program crash
PID:3064
-
-