Analysis
-
max time kernel
159s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
237e3cf9f73108ae0b3a97c4270d9acb.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
237e3cf9f73108ae0b3a97c4270d9acb.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
237e3cf9f73108ae0b3a97c4270d9acb.exe
-
Size
115KB
-
MD5
237e3cf9f73108ae0b3a97c4270d9acb
-
SHA1
c9565d3017a589bf2c70939b469c9a783ae3dbde
-
SHA256
cf232bd08938298920949002a6ba6b206ada3122f29740964b8bad285b15be1c
-
SHA512
3adb15254745a45b7ab43d4cd38712f8d1cb6aec4974afcf7d17a9c3566e2bc12509c7e13392ea6374c4dd063b43db98c756fce2de6cb0795d4528ef75b4e53e
-
SSDEEP
3072:R7DBfijNw+oxsbh6mjmt+R7Cl6UKe8h7ep:KFo8/Sg5Hhip
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/404-5-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/404-4-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/memory/404-2-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4544 set thread context of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 -
Program crash 1 IoCs
pid pid_target Process procid_target 2708 404 WerFault.exe 75 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75 PID 4544 wrote to memory of 404 4544 237e3cf9f73108ae0b3a97c4270d9acb.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\237e3cf9f73108ae0b3a97c4270d9acb.exe"C:\Users\Admin\AppData\Local\Temp\237e3cf9f73108ae0b3a97c4270d9acb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\237e3cf9f73108ae0b3a97c4270d9acb.exePID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 2283⤵
- Program crash
PID:2708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 404 -ip 4041⤵PID:2796