Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 07:01

General

  • Target

    66fd37279c6abe89abcaf395add7a667.exe

  • Size

    148KB

  • MD5

    66fd37279c6abe89abcaf395add7a667

  • SHA1

    d3b047c9ddd79186980c689b56643e16353c9106

  • SHA256

    4fbf9efdc6cf6181e5daff8b6c772c837b0c317688dcc9f9c2276df4e89bd129

  • SHA512

    b50546b62dca7932d124daf4b24cb532c02e593a16bf957a131547eadfe56f776e9f009b37cda41d302d6b985cf1f9d6812e58c93f8237a9fd3c302355b9ef65

  • SSDEEP

    3072:mytid1LhhFHTJKsSx3BZ9eYryY3e9rz8Kie4nDdd1mjcPD4k/sx+0Ire:2PFzJKsASYO9rzsZXP8k/sx+0qe

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66fd37279c6abe89abcaf395add7a667.exe
    "C:\Users\Admin\AppData\Local\Temp\66fd37279c6abe89abcaf395add7a667.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 832
      2⤵
      • Program crash
      PID:2748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1936-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1936-1-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-3-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-2-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-4-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-6-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-9-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-8-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-7-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-5-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-14-0x00000000750A0000-0x0000000075190000-memory.dmp

    Filesize

    960KB

  • memory/1936-12-0x0000000074DA0000-0x0000000074DAC000-memory.dmp

    Filesize

    48KB

  • memory/1936-11-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1936-16-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1936-15-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-19-0x00000000748B0000-0x00000000748B7000-memory.dmp

    Filesize

    28KB

  • memory/1936-21-0x0000000076720000-0x0000000076726000-memory.dmp

    Filesize

    24KB

  • memory/1936-20-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-18-0x0000000074860000-0x00000000748AF000-memory.dmp

    Filesize

    316KB

  • memory/1936-17-0x00000000748B0000-0x0000000074908000-memory.dmp

    Filesize

    352KB

  • memory/1936-22-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-23-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1936-24-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1936-25-0x0000000074DA0000-0x0000000074DAC000-memory.dmp

    Filesize

    48KB

  • memory/1936-26-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1936-27-0x00000000748B0000-0x0000000074908000-memory.dmp

    Filesize

    352KB

  • memory/1936-29-0x00000000748B0000-0x00000000748B7000-memory.dmp

    Filesize

    28KB