Analysis
-
max time kernel
119s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d12a9d3406bd1e9ea8a4cc01c3215c8.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d12a9d3406bd1e9ea8a4cc01c3215c8.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
2d12a9d3406bd1e9ea8a4cc01c3215c8.exe
-
Size
642KB
-
MD5
2d12a9d3406bd1e9ea8a4cc01c3215c8
-
SHA1
98269228313a0d389fcfa59d4b025380be332d73
-
SHA256
9a418f80ec2064f9954160a90644f1f6b107711ad152113a2ef72554ae0aa2b9
-
SHA512
d933371436ba6c373180c9040dd48e5eb64e447126344b3c227458cba84d9b89de4a3c837fc8355ee4d098fbce349b37bcdcc87c2c37dfd6d9fda9052a18e826
-
SSDEEP
12288:PEiOcPfZHHo39217zBO6KoBF3Z4mxx1DqVTVOCAq6S:PEiOcPfxoNWYluQmXEVTzAA
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2592 632 WerFault.exe 14 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 632 wrote to memory of 2716 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 22 PID 632 wrote to memory of 2716 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 22 PID 632 wrote to memory of 2716 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 22 PID 632 wrote to memory of 2716 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 22 PID 632 wrote to memory of 2592 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 21 PID 632 wrote to memory of 2592 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 21 PID 632 wrote to memory of 2592 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 21 PID 632 wrote to memory of 2592 632 2d12a9d3406bd1e9ea8a4cc01c3215c8.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d12a9d3406bd1e9ea8a4cc01c3215c8.exe"C:\Users\Admin\AppData\Local\Temp\2d12a9d3406bd1e9ea8a4cc01c3215c8.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 3162⤵
- Program crash
PID:2592
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵PID:2716
-