Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
18-11-2023 15:04
Behavioral task
behavioral1
Sample
ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe
Resource
win7-20231020-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe
-
Size
4.9MB
-
MD5
bef936e0f52f74471ed4f892c4aed4ed
-
SHA1
fdcab51035a4bef3767259e653d2e5bdca4fbaa3
-
SHA256
ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a
-
SHA512
a9a3f15ea9725c4fa40f2426d3c90aa6811e1e8ba063e69dab31391a223862a5c245ca7db6948ba67f5e94357ee61e38f3ac215eb04dc0fbe54d561dc3eccad2
-
SSDEEP
98304:YdK+LNVmvsMdGcqWIkDwSqyJRPB2H6iuNMWUtzRi/BY6TDj:Y3D7MdwktlRQaz27i/G6Tv
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1964-0-0x0000000000400000-0x0000000000C4E000-memory.dmp upx behavioral1/memory/1964-9-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-11-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-13-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-15-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-17-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-21-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-25-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-29-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-31-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-27-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-23-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-19-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-33-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-14-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-12-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-39-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-41-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-37-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-42-0x0000000000400000-0x0000000000C4E000-memory.dmp upx behavioral1/memory/1964-35-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-44-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-46-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-48-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-50-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-52-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-54-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-57-0x0000000002670000-0x00000000026AE000-memory.dmp upx behavioral1/memory/1964-58-0x0000000002670000-0x00000000026AE000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 1964 WerFault.exe 27 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2888 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe 28 PID 1964 wrote to memory of 2888 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe 28 PID 1964 wrote to memory of 2888 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe 28 PID 1964 wrote to memory of 2888 1964 ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe"C:\Users\Admin\AppData\Local\Temp\ba9bec29269eeae11bd774bb9878698eefe9e5681ccb5e41faea08255c96403a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 5522⤵
- Program crash
PID:2888
-