Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 08:10
Behavioral task
behavioral1
Sample
5abc5f542610ce9e34b6bc7761bd6584.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5abc5f542610ce9e34b6bc7761bd6584.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
5abc5f542610ce9e34b6bc7761bd6584.exe
-
Size
117KB
-
MD5
5abc5f542610ce9e34b6bc7761bd6584
-
SHA1
c1a885ff9f090b10a21cc67db452b3245f026415
-
SHA256
62db1ee2838785415de18dd96887696fd4c6ce57bc28c8eace25c5d2e8a4c808
-
SHA512
e72227ae46d22b88e276469c00bc7dd0660498deb8ea884f09aeafb0ce2447ac7ffee30c868255a782e6b0f5fee40b3d0ea19bc28e3749071a83551d61b0779d
-
SSDEEP
3072:OoVjCV3Mv0j3ZXVf8HtaIUmLmP/lAwPEbADK4/:OolQt0H04LCP4ADK4/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1520-0-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/1520-1-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2036 1520 WerFault.exe 13 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2036 1520 5abc5f542610ce9e34b6bc7761bd6584.exe 28 PID 1520 wrote to memory of 2036 1520 5abc5f542610ce9e34b6bc7761bd6584.exe 28 PID 1520 wrote to memory of 2036 1520 5abc5f542610ce9e34b6bc7761bd6584.exe 28 PID 1520 wrote to memory of 2036 1520 5abc5f542610ce9e34b6bc7761bd6584.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5abc5f542610ce9e34b6bc7761bd6584.exe"C:\Users\Admin\AppData\Local\Temp\5abc5f542610ce9e34b6bc7761bd6584.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 482⤵
- Program crash
PID:2036
-