Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-02-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe
Resource
win10v2004-20231215-en
General
-
Target
8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe
-
Size
6KB
-
MD5
175fdd28169a97ad78567de9054ed229
-
SHA1
995eeb9df509170906c728d5e9e5fa236d1028fc
-
SHA256
8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8
-
SHA512
b409e71e4a499a5d1f3e5e82c9e3b95378fd463b5b98b667afdc555ce351dd9e09b811d08d8bbc3fdcbaebc5a1b2a7a4b7e47909802178dbe03d2f254e1c6cd1
-
SSDEEP
48:S7bt0S4FVgCp471Ib4Fc/38+N7DYocHa23WlTpebVetFygFI5a2oxdVoZiG/9u3O:i0mIGnFc/38+N4ZHJWSY9FI5Wqox
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2496 2040 8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe 28 PID 2040 wrote to memory of 2496 2040 8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe 28 PID 2040 wrote to memory of 2496 2040 8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe"C:\Users\Admin\AppData\Local\Temp\8082bbca7fe8b395a443e9ad523d51f117a1d9c8437f5e09b79cbc8eb345b4a8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2040 -s 322⤵PID:2496
-