Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:26
Behavioral task
behavioral1
Sample
07dcb1c19c71ac53ba91ffc493a4c5b4.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
07dcb1c19c71ac53ba91ffc493a4c5b4.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
07dcb1c19c71ac53ba91ffc493a4c5b4.exe
-
Size
39KB
-
MD5
07dcb1c19c71ac53ba91ffc493a4c5b4
-
SHA1
3ae9703e4729392da7820dcd04edeae778cf46ea
-
SHA256
25c995d65fffc03141bd818bd6fdca9e82aa0a25e8b8de14601f5836659d1abe
-
SHA512
16c807bf0644287f26dba7f2bfe7ddee18075c466cd782d18f481b2dd42115f3db95ea6b63ea199536618abcdeef55ea97017b8740fcdea18f03cf55430edc17
-
SSDEEP
768:D0D/5NA0Fn0hMxdzDP9Gbk6llQdZdHuLV243+mMemtf124ctCe:oDDvFn0CbPgbhgNuc2+mLmt8rCe
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/428-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/428-2-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3920-3-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 428 set thread context of 3920 428 07dcb1c19c71ac53ba91ffc493a4c5b4.exe 20 -
Program crash 2 IoCs
pid pid_target Process procid_target 4880 3920 WerFault.exe 20 3780 3920 WerFault.exe 20 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 428 wrote to memory of 3920 428 07dcb1c19c71ac53ba91ffc493a4c5b4.exe 20 PID 428 wrote to memory of 3920 428 07dcb1c19c71ac53ba91ffc493a4c5b4.exe 20 PID 428 wrote to memory of 3920 428 07dcb1c19c71ac53ba91ffc493a4c5b4.exe 20 PID 428 wrote to memory of 3920 428 07dcb1c19c71ac53ba91ffc493a4c5b4.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\07dcb1c19c71ac53ba91ffc493a4c5b4.exe"C:\Users\Admin\AppData\Local\Temp\07dcb1c19c71ac53ba91ffc493a4c5b4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 2923⤵
- Program crash
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 3003⤵
- Program crash
PID:3780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3920 -ip 39201⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3920 -ip 39201⤵PID:1896