Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 09:14
Behavioral task
behavioral1
Sample
bae04a9e810e8c0b186fe62741e05cae.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bae04a9e810e8c0b186fe62741e05cae.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
bae04a9e810e8c0b186fe62741e05cae.exe
-
Size
17KB
-
MD5
bae04a9e810e8c0b186fe62741e05cae
-
SHA1
5d2c124f451efe5599ee07bfc009c96eaf264cfb
-
SHA256
bdbbc2e38c2c2ac983c5733a7e4fa5cc0834de3ca6d713953953a7deabbdee23
-
SHA512
542f29eec8275ebb0635277f0fd121fcad86fd728c63499deb65d2e8afebe855ae7553a087ac973eeb60b6bcab8cad78f7e0e01e9ea6ed447e5db24767aad3f1
-
SSDEEP
192:zjN3ccWgCLGGrsn1m9sE9s0Wh8rKXhB+ShcTj:zjqcWg6/rsnQrDWh8rKRB+gcP
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2888-0-0x0000000000400000-0x0000000000406000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3004 2888 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3004 2888 bae04a9e810e8c0b186fe62741e05cae.exe 28 PID 2888 wrote to memory of 3004 2888 bae04a9e810e8c0b186fe62741e05cae.exe 28 PID 2888 wrote to memory of 3004 2888 bae04a9e810e8c0b186fe62741e05cae.exe 28 PID 2888 wrote to memory of 3004 2888 bae04a9e810e8c0b186fe62741e05cae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae04a9e810e8c0b186fe62741e05cae.exe"C:\Users\Admin\AppData\Local\Temp\bae04a9e810e8c0b186fe62741e05cae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 362⤵
- Program crash
PID:3004
-