Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:53
Behavioral task
behavioral1
Sample
12b2b23b349dfefa520b6c2f4b08041f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
12b2b23b349dfefa520b6c2f4b08041f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
12b2b23b349dfefa520b6c2f4b08041f.exe
-
Size
247KB
-
MD5
12b2b23b349dfefa520b6c2f4b08041f
-
SHA1
187c40cc547f12e8efa7be3e2f544bfb2a1a640d
-
SHA256
3ae0748b2b820fa94efb32c5aaca52ddd7c73c11d2bd9eccc3763a618d5b0028
-
SHA512
6282547307f8609d0fb373b92f27a3e1b5a42bdbd3a78c343bb6d70eb1c3f4f2e5b38ca05a88afe71a4c00bfca917610ba52e5cf29c0627be7b2f92a67862ad5
-
SSDEEP
3072:NBwf1Nlq6Wa2DN54gmFtuyefdYG6w7cZvA6naTT3pBTed/y8McIpMv5uUiOGQfXw:NGNNFWxD7mrHkWC4aTT5BBSIQAOGQvNW
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 2860 2052 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2052 12b2b23b349dfefa520b6c2f4b08041f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2860 2052 12b2b23b349dfefa520b6c2f4b08041f.exe 14 PID 2052 wrote to memory of 2860 2052 12b2b23b349dfefa520b6c2f4b08041f.exe 14 PID 2052 wrote to memory of 2860 2052 12b2b23b349dfefa520b6c2f4b08041f.exe 14 PID 2052 wrote to memory of 2860 2052 12b2b23b349dfefa520b6c2f4b08041f.exe 14
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 1601⤵
- Program crash
PID:2860
-
C:\Users\Admin\AppData\Local\Temp\12b2b23b349dfefa520b6c2f4b08041f.exe"C:\Users\Admin\AppData\Local\Temp\12b2b23b349dfefa520b6c2f4b08041f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052