Analysis
-
max time kernel
94s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2023 14:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Insta_Like.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Insta_Like.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Insta_Like.exe
-
Size
349KB
-
MD5
9966a0cdc9a41077d28ce17998b6eb1f
-
SHA1
61db9bd14d06fa8a72c0c7ff0ae89c96f3b35cd4
-
SHA256
66d4f52ede1cf7ef00a359ed447cef6cca9423f391f01ea600942c0c715b0f76
-
SHA512
9c72a14382c1460d469fc4b185bfce3e8e7e64f7ec5f57cdc3e43a8cb7877a4ea04ff5c1d9535112244451079288598ebc77097fbd8c5c351e608893fc6351ea
-
SSDEEP
1536:qrNDM5a1uVKsA4iM2Y4ALApuXuKcA4iM2YyALApuXuWce:BC2Qmdpmdf
Score
3/10
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 4004 4408 WerFault.exe 66 2544 4408 WerFault.exe 66 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4408 Insta_Like.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4408 Insta_Like.exe 4408 Insta_Like.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insta_Like.exe"C:\Users\Admin\AppData\Local\Temp\Insta_Like.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 29882⤵
- Program crash
PID:4004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 26042⤵
- Program crash
PID:2544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4408 -ip 44081⤵PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4408 -ip 44081⤵PID:2512