Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
02195a0bf29f921072b976cfd53af33f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
02195a0bf29f921072b976cfd53af33f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
02195a0bf29f921072b976cfd53af33f.exe
-
Size
184KB
-
MD5
02195a0bf29f921072b976cfd53af33f
-
SHA1
32494e1eb98b15c4dd43e19161f8945bbaf8afaf
-
SHA256
1a14ecd2115841f3be3308d19850504d8cb6838874c182c09c35cc1c21158f9a
-
SHA512
07ddb1dd5cea9687a1d4e91b6340f4b4f4c5a7846874e882030c5db34a7059e524487b62fef34ebee611cea8b5527ee5edac454a996665185cb9cbd51c236365
-
SSDEEP
3072:FI5bBj9YUdtG716ennADVeMfcRAGKB+uMTEd1CT:Filu1tnADVhERAGKB+uSEd
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2420 2900 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 02195a0bf29f921072b976cfd53af33f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2420 2900 02195a0bf29f921072b976cfd53af33f.exe 28 PID 2900 wrote to memory of 2420 2900 02195a0bf29f921072b976cfd53af33f.exe 28 PID 2900 wrote to memory of 2420 2900 02195a0bf29f921072b976cfd53af33f.exe 28 PID 2900 wrote to memory of 2420 2900 02195a0bf29f921072b976cfd53af33f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02195a0bf29f921072b976cfd53af33f.exe"C:\Users\Admin\AppData\Local\Temp\02195a0bf29f921072b976cfd53af33f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 1882⤵
- Program crash
PID:2420
-