Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe
-
Size
1.3MB
-
MD5
c35cb1902ca6f252a90c677d6b859982
-
SHA1
caa893aa54010ef9e9455e98b689c6150c2443e0
-
SHA256
042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58
-
SHA512
3b631ad24c331297e724443feda57b864f958206d7a05f72c29edca3282ebc72df4bf85a649240b2d1f328444a488cc9d875fbaefd0f390c7d853666cdfdfd83
-
SSDEEP
24576:FpyhP5RFFrSEyFPu8JR9ksaQFCLwbLflBPg:CyFPu8D9k5QELuL4
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5432 set thread context of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 -
Program crash 1 IoCs
pid pid_target Process procid_target 2180 3376 WerFault.exe 96 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3376 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 3376 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 3376 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 3376 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 3376 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96 PID 5432 wrote to memory of 3376 5432 042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe"C:\Users\Admin\AppData\Local\Temp\042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5432 -
C:\Users\Admin\AppData\Local\Temp\042a2bfcf4013f9ea975d39034a85527c556c1cd3e07147c36545a1fe47d6a58.exe
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 19363⤵
- Program crash
PID:2180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3376 -ip 33761⤵PID:1584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3996 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:1480