Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe
-
Size
110KB
-
MD5
5ef6149e8003c90a6a4d65b1a8c1d690
-
SHA1
eec7ea9f2f65e12512f58cb3df61edf1bfbf0a9e
-
SHA256
a3c87829ca6ad7f73efd714a3fc0f9d318703f848cee880693c283eec7155584
-
SHA512
db6ede884cfaa91b394f3d4bbfe606605c4b75675c21c3176f4fb21a916e66c91f3c0533afd071db356fe389ca4351180a11b99b62bdbbb70715010d9c3bcf40
-
SSDEEP
3072:t3WU41cTYuPbeZh45iMzjxfrsBnhOD6FFodt:tmUyiY+bYhTMzjxfrqOWW3
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2192 2364 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exedescription pid Process procid_target PID 2364 wrote to memory of 2192 2364 2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe 28 PID 2364 wrote to memory of 2192 2364 2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe 28 PID 2364 wrote to memory of 2192 2364 2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe 28 PID 2364 wrote to memory of 2192 2364 2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_5ef6149e8003c90a6a4d65b1a8c1d690_virlock.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 362⤵
- Program crash
PID:2192
-