Analysis
-
max time kernel
172s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 03:54
Static task
static1
Behavioral task
behavioral1
Sample
3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe
Resource
win10v2004-20230915-en
General
-
Target
3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe
-
Size
2.0MB
-
MD5
f55e55998f57d307563a682f0f0e3a49
-
SHA1
4a7541559fd6edf0950ed485bffbca804e9b7cec
-
SHA256
3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3
-
SHA512
63b3bafef7322ec7df2045bf5abedd035f2c3e24bc556ac6eb30b3291bb10962082ddeb3562f092d138564c46ab8a3d1ae685a4986ff54f3fc76e436d183a349
-
SSDEEP
49152:r/xYPn9RWJ7fMrW38+5/LZmW5nBJcVhKl0Vc0J:lYPwMrW38G/VmW9Y+q
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1136 3720 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe 3720 3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe"C:\Users\Admin\AppData\Local\Temp\3db13a7e56102e35fea9090cb5b781a619e04e421f081f0bc853ee075c131ce3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 2962⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3720 -ip 37201⤵PID:1616