Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 15:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe
-
Size
110KB
-
MD5
fae3ecc27574ae345512db650fcfdd88
-
SHA1
714f10b3468893b86eb8c4d7b4a803ab45130fde
-
SHA256
8c4fc6f877a2c7b8baa3fcafbad9815c78da0cdfb320960cdd323a08ce69ce8a
-
SHA512
ef94b65e72159e175ca26164e99535cfe6fee57067d8dec1f7186a086cf5f2f6054bc1a7d9ae132bbc7c5591622f0ed27178dbb29df037a6cc738eb9d0a95e53
-
SSDEEP
1536:orhiKCux5t0Hc0sEK8m97Mbftz+fQZuUw+kJoScZCnc6yaFExiycaNbtwhFwih:or4us7sNYR+6uUw+kJocc3xiswh6
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2248 2628 WerFault.exe 2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exedescription pid process target process PID 2628 wrote to memory of 2248 2628 2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe WerFault.exe PID 2628 wrote to memory of 2248 2628 2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe WerFault.exe PID 2628 wrote to memory of 2248 2628 2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe WerFault.exe PID 2628 wrote to memory of 2248 2628 2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_fae3ecc27574ae345512db650fcfdd88_virlock.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 362⤵
- Program crash
PID:2248
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2628-0-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB