Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 10:16
Static task
static1
Behavioral task
behavioral1
Sample
01c07efcfb32bf903701f43a00bb8aa0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01c07efcfb32bf903701f43a00bb8aa0.exe
Resource
win10v2004-20231215-en
General
-
Target
01c07efcfb32bf903701f43a00bb8aa0.exe
-
Size
400KB
-
MD5
01c07efcfb32bf903701f43a00bb8aa0
-
SHA1
4a5ab8eb93ba1013eaebfc11a6a1394e2b7b8746
-
SHA256
e9e817ad892c6295459c2573c538925bcda3cc36adba56dcf33c8d5217bf0368
-
SHA512
118dca14143d8ba3d6387c29dba7d7bea5fa40113550b11112e8cb98dde72406c9d6ee3360ce304249cc10a90c3e3062cb556272def02c8e98de211ee2a8bbea
-
SSDEEP
6144:o0gA0uIV7EXan7ElpY4WCJOEhBevHnNytR6dWa7UFFlT:o0gA037waWpT7hBePctR6dWFFl
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
01c07efcfb32bf903701f43a00bb8aa0.exedescription pid process target process PID 2320 set thread context of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2788 2436 WerFault.exe 01c07efcfb32bf903701f43a00bb8aa0.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
01c07efcfb32bf903701f43a00bb8aa0.exe01c07efcfb32bf903701f43a00bb8aa0.exe01c07efcfb32bf903701f43a00bb8aa0.exedescription pid process target process PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2324 wrote to memory of 2320 2324 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2320 wrote to memory of 2436 2320 01c07efcfb32bf903701f43a00bb8aa0.exe 01c07efcfb32bf903701f43a00bb8aa0.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe PID 2436 wrote to memory of 2788 2436 01c07efcfb32bf903701f43a00bb8aa0.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c07efcfb32bf903701f43a00bb8aa0.exe"C:\Users\Admin\AppData\Local\Temp\01c07efcfb32bf903701f43a00bb8aa0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\01c07efcfb32bf903701f43a00bb8aa0.exe"C:\Users\Admin\AppData\Local\Temp\01c07efcfb32bf903701f43a00bb8aa0.exe" -l2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\01c07efcfb32bf903701f43a00bb8aa0.exeC:\Users\Admin\AppData\Local\Temp\01c07efcfb32bf903701f43a00bb8aa0.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 2524⤵
- Program crash
PID:2788