Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe
Resource
win10v2004-20231222-en
General
-
Target
57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe
-
Size
6KB
-
MD5
9d2a4817d10728ade3db71cf6002a44a
-
SHA1
eab943ae73bbea26d35916ac66a3ec57cf2afd3d
-
SHA256
57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0
-
SHA512
38a4726b6148ec30fc8a19ea691fbd8e232edf3fe089ef87fe59bd28e10e799be4d1cdccd8fb597d8b27c33ad6999bcbef5445fa564c356b24d939da95898eae
-
SSDEEP
48:SdCbt0S4FVgCp471Ib4Fc/38+N7DYocHa23WlTpebVetFygFI5a2oxdVoZiG/9u2:eu0mIGnFc/38+N4ZHJWSY9FI5Wqgx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2572 2072 57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe 28 PID 2072 wrote to memory of 2572 2072 57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe 28 PID 2072 wrote to memory of 2572 2072 57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe"C:\Users\Admin\AppData\Local\Temp\57b5f026efc247211b0ef7eb5ae32c00baa63548ba6465d8c7e7e3bdadc87af0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2072 -s 322⤵PID:2572
-