Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 19:05

General

  • Target

    4c391759d800654a4208acb8a3812a5e.exe

  • Size

    87KB

  • MD5

    4c391759d800654a4208acb8a3812a5e

  • SHA1

    3429246c9a0d43ec213e70011ab0669975f6ed10

  • SHA256

    7b90501de6a4e2a6e68d413d7909d2ac09b7e476f2409e5ad532db8f86b6fee3

  • SHA512

    8ea14b014ae99d30b14e658d5e9a0246fa5d459c84708bde124847999360f765336e8a2529d1f78a5546de0325184f74887213c7f4d781dd37ba1f50f57d3d78

  • SSDEEP

    1536:Rjfaqn6cucb7Rn13UDMgX0sOjNeRnXF0xftuUXVcaKfAQZB1vICB7f5dVoLnhaJ:xacJb7RnqMc0xcnXrpaIrH1xV5d6ThaJ

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\4c391759d800654a4208acb8a3812a5e.exe
        "C:\Users\Admin\AppData\Local\Temp\4c391759d800654a4208acb8a3812a5e.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 196
          3⤵
          • Program crash
          PID:3024
        • C:\Users\Admin\AppData\Local\Temp\4c391759d800654a4208acb8a3812a5e.exe
          "C:\Users\Admin\AppData\Local\Temp\4c391759d800654a4208acb8a3812a5e.exe" ÇEüþÿÿÿè@ÿÿÂ
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2148

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1200-6-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1200-9-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/2148-3-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2148-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2148-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2148-4-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2148-20-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2148-18-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB