Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 03:12
Static task
static1
Behavioral task
behavioral1
Sample
35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe
Resource
win10v2004-20230915-en
General
-
Target
35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe
-
Size
742KB
-
MD5
e8f2c4652165760519c6353f74c84c8e
-
SHA1
de9a0b1e42fb43ed97e73f46adcce6215243852c
-
SHA256
35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd
-
SHA512
48b9f2928c2de7b7f9c25380e93d69b686674034fe7f64d02ed0e4beb142fb715303e809cb5ea4964bfe0dc74b1241e8cbdcc73d9e42b2f685d4e2f3a3407ace
-
SSDEEP
12288:Pn//yfYb5BIQZVt8H1fhpnsuG3/Nl7lNAEEJhzGfy8OXdLygvooc9:/iuBtZKfhpnsNPFizGK8OtyF
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1004 set thread context of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2508 2648 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2656 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 30 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 1004 wrote to memory of 2648 1004 35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe 31 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32 PID 2648 wrote to memory of 2508 2648 AppLaunch.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe"C:\Users\Admin\AppData\Local\Temp\35db8c9d9387fff19e234c0c4520acefcfb7906c3311e92d1643031014936acd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 2003⤵
- Program crash
PID:2508
-
-