Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 07:53
Static task
static1
Behavioral task
behavioral1
Sample
TempData61059195095/CyberPewerPC.Atento.08738.2951.321.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
TempData61059195095/CyberPewerPC.Atento.08738.2951.321.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
TempData61059195095/sqlite3.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
TempData61059195095/sqlite3.dll
Resource
win10v2004-20231222-en
General
-
Target
TempData61059195095/sqlite3.dll
-
Size
910KB
-
MD5
def2572ccae7f518bd9d30f37b2fed04
-
SHA1
eaec1754a69c50eac99e774b07ef156a1ca6de06
-
SHA256
b712286d4d36c74fa32127f848b79cfb857fdc2b1c84bbbee285cf34752443a2
-
SHA512
f6183e6b7989cfc342f28074e0c79223765a5995e04e5e1e9d2c6edd12837bf5a825a0800f2941c3c7eedc37258052fd72fd7f1421d88c426666a30b4436aa4a
-
SSDEEP
24576:eYFrkZwGN1oSBMMBuNOh7pRUTM+Eex/3Di:eM6MSBlB2Oh7pRUort
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 3048 3052 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 2688 wrote to memory of 3052 2688 rundll32.exe 15 PID 3052 wrote to memory of 3048 3052 rundll32.exe 14 PID 3052 wrote to memory of 3048 3052 rundll32.exe 14 PID 3052 wrote to memory of 3048 3052 rundll32.exe 14 PID 3052 wrote to memory of 3048 3052 rundll32.exe 14
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2241⤵
- Program crash
PID:3048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TempData61059195095\sqlite3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TempData61059195095\sqlite3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2688