Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06-02-2024 20:40
Behavioral task
behavioral1
Sample
956a768208ff48981465018d86d3c592.exe
Resource
win7-20231215-en
General
-
Target
956a768208ff48981465018d86d3c592.exe
-
Size
15KB
-
MD5
956a768208ff48981465018d86d3c592
-
SHA1
a4ec75f3ae2ab4c5880faefcd3b7c78bb906aa2f
-
SHA256
8d9f9bd5bfebfd5ca156a898cc21240d767aea11c8943d34760b05bdff586387
-
SHA512
9f69e1eeed79687e14ca674ff2dc7d82e08648e6e726ad3779fc9f0d576ba4bb4eec05803f3fe377b5e71705178aa5c191430ff56239f60499ddda88eeb33656
-
SSDEEP
192:IGVSJrJf+Bm72P4WOnefWRjyShQSPDSFa/rtKI89Wo7rFysFMIT:pYdh+BeSON2ShQSPDSUzth8957rFviI
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/874247640320204820/3B1X1K91RjBXiE1hDnhrKls4Ih9fE6Ge_n0uYQTa2cOY8SZ1MifX9KsVxzk4U4MVBNnJ
-
payload_url
https://cdn.discordapp.com/attachments/858108963778199552/872458910047559681/savedecoder.exe
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2220 2084 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
956a768208ff48981465018d86d3c592.exedescription pid Process procid_target PID 2084 wrote to memory of 2220 2084 956a768208ff48981465018d86d3c592.exe 28 PID 2084 wrote to memory of 2220 2084 956a768208ff48981465018d86d3c592.exe 28 PID 2084 wrote to memory of 2220 2084 956a768208ff48981465018d86d3c592.exe 28 PID 2084 wrote to memory of 2220 2084 956a768208ff48981465018d86d3c592.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\956a768208ff48981465018d86d3c592.exe"C:\Users\Admin\AppData\Local\Temp\956a768208ff48981465018d86d3c592.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 6402⤵
- Program crash
PID:2220
-