Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
43c4dfa115a1ca491c400ade5f1d9c6c.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
43c4dfa115a1ca491c400ade5f1d9c6c.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
43c4dfa115a1ca491c400ade5f1d9c6c.exe
-
Size
868KB
-
MD5
43c4dfa115a1ca491c400ade5f1d9c6c
-
SHA1
7e609d73e7d5ea4ca16179066b793248af343c9f
-
SHA256
e1a92a6033986ebcc1838f06a1bf927dcc7362bac071a365e91e00c9fafdbec3
-
SHA512
aa3ba32962a9612e2abdc4d104f825c8e675eb922c18c03c7cbe39b1eb749b4b74c03b1691253807f2f1192edfefe61f4af048996a55584978a8258ac780b96c
-
SSDEEP
12288:RRf2+wmjFPKe0Dm7l4WaXAIcd2nHC1/SMZoSmrzUs7Nl:RRf5jeUldaXAbd2nHCQMWIul
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/400-2-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-17-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-31-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-47-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-50-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-49-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-45-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-43-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-41-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-39-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-37-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-35-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-33-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-28-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-26-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-24-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-51-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-21-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-19-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-15-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-13-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-11-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-8-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-6-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-5-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-4-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-3-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/400-0-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 3964 400 WerFault.exe 14 752 400 WerFault.exe 14 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 400 43c4dfa115a1ca491c400ade5f1d9c6c.exe 400 43c4dfa115a1ca491c400ade5f1d9c6c.exe 400 43c4dfa115a1ca491c400ade5f1d9c6c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c4dfa115a1ca491c400ade5f1d9c6c.exe"C:\Users\Admin\AppData\Local\Temp\43c4dfa115a1ca491c400ade5f1d9c6c.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8642⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 8642⤵
- Program crash
PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 400 -ip 4001⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 400 -ip 4001⤵PID:4572