Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 20:24
Behavioral task
behavioral1
Sample
7de9aecde40ba4cd45cda106d6397c55.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
7de9aecde40ba4cd45cda106d6397c55.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7de9aecde40ba4cd45cda106d6397c55.exe
-
Size
35KB
-
MD5
7de9aecde40ba4cd45cda106d6397c55
-
SHA1
bcca42e60f1f058566917bf921488090b22760ee
-
SHA256
eb06dae8c3a1852063dcc4d5d7ae29de3b246ecb2d7ce75b66e2aa38700ff978
-
SHA512
406ae1bb504fecca2b9d57a87494423d986e6c0c37fe0aa552841c58f7991ae8722a6f9f2bd7bffab6b48a8a4882afe2033d71aaa733e12a451f3a37e3ef8747
-
SSDEEP
384:Z6dKsFvt5WDU4TmFkWyjuh+oXBS9+ErHLskU9LgD2iWIWUzNCxhybSJVubdROn3J:4VeDTIRync9eL8y2JGQMHdUnLk5rgGQ
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3448-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3448-4-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\7de9aecde40ba4cd45cda106d6397c55.exe 7de9aecde40ba4cd45cda106d6397c55.exe File opened for modification \??\c:\windows\SysWOW64\7de9aecde40ba4cd45cda106d6397c55.exe 7de9aecde40ba4cd45cda106d6397c55.exe File created \??\c:\windows\SysWOW64\7de9aecde40ba4cd45cda106d6397c55.dll 7de9aecde40ba4cd45cda106d6397c55.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4876 3448 WerFault.exe 82 4380 3448 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3448 7de9aecde40ba4cd45cda106d6397c55.exe 3448 7de9aecde40ba4cd45cda106d6397c55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de9aecde40ba4cd45cda106d6397c55.exe"C:\Users\Admin\AppData\Local\Temp\7de9aecde40ba4cd45cda106d6397c55.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 4602⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 4602⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3448 -ip 34481⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3448 -ip 34481⤵PID:2168