Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
97af4041779cebd3d2517977bd9da15a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97af4041779cebd3d2517977bd9da15a.exe
Resource
win10v2004-20231215-en
General
-
Target
97af4041779cebd3d2517977bd9da15a.exe
-
Size
342KB
-
MD5
97af4041779cebd3d2517977bd9da15a
-
SHA1
6f5e34a0263edb5253adfcaef58705a495782c4a
-
SHA256
21d03564c5ef4ad5c15f8e1fce2b086050af8b7f9d1cf85c5c66e0edd7535a2d
-
SHA512
88b18e96d6e7db2a5fa95f3744b079ebf60d009289d0459f1d9ee0859bf058ea4bc090d048eb3c1d4dc62528c29970f9ecefc61d8d958a15e85256f8de1e5bd2
-
SSDEEP
6144:yjRzl4TnKC5Sq1R4vp1QpPuYA3ClfQUBSTj60VlFD5RYyEcAqy:yjDxC5S1XQp/AUpUTjvVlR5O9
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2616 2312 WerFault.exe 27 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2312 97af4041779cebd3d2517977bd9da15a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2616 2312 97af4041779cebd3d2517977bd9da15a.exe 31 PID 2312 wrote to memory of 2616 2312 97af4041779cebd3d2517977bd9da15a.exe 31 PID 2312 wrote to memory of 2616 2312 97af4041779cebd3d2517977bd9da15a.exe 31 PID 2312 wrote to memory of 2616 2312 97af4041779cebd3d2517977bd9da15a.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\97af4041779cebd3d2517977bd9da15a.exe"C:\Users\Admin\AppData\Local\Temp\97af4041779cebd3d2517977bd9da15a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 8482⤵
- Loads dropped DLL
- Program crash
PID:2616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD542f86a7f92b16b7f5db94e482d6594f5
SHA1b8d46e9c61696a3ea3ee77bf3b7b7431b4c55733
SHA25625d840701ef3b38c131dc96ff9b4d98465fecfdafe437289e283f89aac3a2823
SHA512872853b1ca1740f4dda516b4a0532d44bc430ef8d394f9e24e21338f8f195bd867d13bae999852780f1698ddb40d4d5c17a16a03d68bf41cc794e62cd9c59e88