Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 09:02
Behavioral task
behavioral1
Sample
588606f279e8fbae832dc62df454b87f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
588606f279e8fbae832dc62df454b87f.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
588606f279e8fbae832dc62df454b87f.exe
-
Size
14KB
-
MD5
588606f279e8fbae832dc62df454b87f
-
SHA1
ed999ca20e6b4bc5e98d5e9057fc5a89d097dfae
-
SHA256
fa6654cbf69ce0abfcbc1968baa509f643b1e902c61d6b7abe18bab7a9a5d9d4
-
SHA512
1cf0f0a9cb8287a2cd7d5b9cadb1f959e04ebca781d39c8fe93940991bc4184d871e80eaf597a864be1243ba798a889f2f7713a10e566837bb625d2a55ced3cb
-
SSDEEP
384:7UdkH9FOjujpBueWUKy/620+oOBxdpt1eWL8z:7UKdFOjQpBPWbfgzoWA
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1680-0-0x0000000000400000-0x000000000090D000-memory.dmp upx behavioral1/memory/1680-1-0x0000000000400000-0x000000000090D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2464 1680 WerFault.exe 19 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2464 1680 588606f279e8fbae832dc62df454b87f.exe 28 PID 1680 wrote to memory of 2464 1680 588606f279e8fbae832dc62df454b87f.exe 28 PID 1680 wrote to memory of 2464 1680 588606f279e8fbae832dc62df454b87f.exe 28 PID 1680 wrote to memory of 2464 1680 588606f279e8fbae832dc62df454b87f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\588606f279e8fbae832dc62df454b87f.exe"C:\Users\Admin\AppData\Local\Temp\588606f279e8fbae832dc62df454b87f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 922⤵
- Program crash
PID:2464
-