Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 10:28
Behavioral task
behavioral1
Sample
48baeca3ac19699b95564eda25ff5083.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
48baeca3ac19699b95564eda25ff5083.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
48baeca3ac19699b95564eda25ff5083.exe
-
Size
7KB
-
MD5
48baeca3ac19699b95564eda25ff5083
-
SHA1
2e78f40ffb7ac309d38b4c0254e52415cce3a4c7
-
SHA256
b35313c1f920b166c024b493b559095b883def143d3df6215a8ec933b4bc7911
-
SHA512
468d3d0258a4197598a2318059f3845d297e73180ce9e63976d9f91e2827cb3b5b9057c9bd23b4b235b15b7870df64cd9546adcfde23259dd318c0749d69fd29
-
SSDEEP
192:D9iHZHtqS3uWBj6epwazfRd0FWwHoEJp6/v1kM4Wihd:D9ktb0Mwid0FW83O5biv
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2304-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process 2772 2304 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2772 2304 48baeca3ac19699b95564eda25ff5083.exe 14 PID 2304 wrote to memory of 2772 2304 48baeca3ac19699b95564eda25ff5083.exe 14 PID 2304 wrote to memory of 2772 2304 48baeca3ac19699b95564eda25ff5083.exe 14 PID 2304 wrote to memory of 2772 2304 48baeca3ac19699b95564eda25ff5083.exe 14
Processes
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 881⤵
- Program crash
PID:2772
-
C:\Users\Admin\AppData\Local\Temp\48baeca3ac19699b95564eda25ff5083.exe"C:\Users\Admin\AppData\Local\Temp\48baeca3ac19699b95564eda25ff5083.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304