Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 08:11
Behavioral task
behavioral1
Sample
79b8fd8faa32be6cc33ad3dd8b4b12b9.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
79b8fd8faa32be6cc33ad3dd8b4b12b9.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
79b8fd8faa32be6cc33ad3dd8b4b12b9.exe
-
Size
29KB
-
MD5
79b8fd8faa32be6cc33ad3dd8b4b12b9
-
SHA1
b7af2d7acbd86392bc480c824b49948da14e43cc
-
SHA256
720097d69889b7e86ca1bb9c6503cf164774e47573d5a911a0f1f9c411e03f92
-
SHA512
4427bfc52df1495f0c93491ec706eea811ec7a9758fee0b5dff226d75d31a71ee4b105008c245d6134b32d9d9d0771570d91a30be07b5f01b546e64b237b74e1
-
SSDEEP
768:cR8BxX1aarONe1ixIv7dlDm5BhLcE9fD5n7F/uKEMcf:+8jFXrs/xaLDyB9cmflRu9Lf
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1276-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2656-3-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1276-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2656-4-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2656-7-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\E646KSuj.exe 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe File opened for modification C:\Windows\SysWOW64\E646KSuj.exe 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2648 2656 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2656 1276 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 28 PID 1276 wrote to memory of 2656 1276 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 28 PID 1276 wrote to memory of 2656 1276 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 28 PID 1276 wrote to memory of 2656 1276 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 28 PID 2656 wrote to memory of 2648 2656 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 29 PID 2656 wrote to memory of 2648 2656 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 29 PID 2656 wrote to memory of 2648 2656 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 29 PID 2656 wrote to memory of 2648 2656 79b8fd8faa32be6cc33ad3dd8b4b12b9.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b8fd8faa32be6cc33ad3dd8b4b12b9.exe"C:\Users\Admin\AppData\Local\Temp\79b8fd8faa32be6cc33ad3dd8b4b12b9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\79b8fd8faa32be6cc33ad3dd8b4b12b9.exe"C:\Users\Admin\AppData\Local\Temp\79b8fd8faa32be6cc33ad3dd8b4b12b9.exe" y±²³2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 2403⤵
- Program crash
PID:2648
-
-