Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:11
Behavioral task
behavioral1
Sample
2ce49505391e864ae04d900d22590396.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2ce49505391e864ae04d900d22590396.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2ce49505391e864ae04d900d22590396.exe
-
Size
27KB
-
MD5
2ce49505391e864ae04d900d22590396
-
SHA1
fc9ab860ce4d8d2bab3adc5c15cfd700e0f96668
-
SHA256
4535b725fc456a4e0eff35dfff80f6161f3407299d61d05768d90b3b5759f790
-
SHA512
5bcc15038b738540c214e76573ac746766641dda058bd757130d3bce02577d256e5adfc46bd12b92711762041840c4ff46a96501b25f381d959eaa766488a0ac
-
SSDEEP
768:o6K8BBdfs1jlOf8c9sDL41wD0/AlSZLgddFenc:ogB01J1HEGJAZcddFZ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2668-1-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2148 2668 WerFault.exe 11 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2148 2668 2ce49505391e864ae04d900d22590396.exe 20 PID 2668 wrote to memory of 2148 2668 2ce49505391e864ae04d900d22590396.exe 20 PID 2668 wrote to memory of 2148 2668 2ce49505391e864ae04d900d22590396.exe 20 PID 2668 wrote to memory of 2148 2668 2ce49505391e864ae04d900d22590396.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce49505391e864ae04d900d22590396.exe"C:\Users\Admin\AppData\Local\Temp\2ce49505391e864ae04d900d22590396.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 642⤵
- Program crash
PID:2148
-