Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 05:02
Static task
static1
Behavioral task
behavioral1
Sample
69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe
Resource
win10-20231215-en
General
-
Target
69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe
-
Size
323KB
-
MD5
6953571095d90aec587ffe24cb46f9e9
-
SHA1
f048943da1d244f55040588904eb0854512d8c8a
-
SHA256
69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e
-
SHA512
af37ae3a7affa36d44bf5fc8306cab4457c6a78b7136b0a0f3be39d19d92508aa3b00ce6d346afbbcc04822a1f41c82a82e5ebd4d97648756f64ae13bb832300
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 -
Program crash 1 IoCs
pid pid_target Process procid_target 2876 1724 WerFault.exe 20 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 2180 wrote to memory of 1724 2180 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 20 PID 1724 wrote to memory of 2876 1724 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 29 PID 1724 wrote to memory of 2876 1724 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 29 PID 1724 wrote to memory of 2876 1724 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 29 PID 1724 wrote to memory of 2876 1724 69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe"C:\Users\Admin\AppData\Local\Temp\69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exeC:\Users\Admin\AppData\Local\Temp\69323beaf200b8707faed2d4fa693eb9a62637c05b149b5cfaa2fa5dfee5ed5e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1163⤵
- Program crash
PID:2876
-
-