Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 20:40
Behavioral task
behavioral1
Sample
d47a0cd165ce5b35618c9323b573d7e5.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d47a0cd165ce5b35618c9323b573d7e5.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
d47a0cd165ce5b35618c9323b573d7e5.exe
-
Size
31KB
-
MD5
d47a0cd165ce5b35618c9323b573d7e5
-
SHA1
827f4157d02b1076d7f8d9de06c6b7a66ccad230
-
SHA256
b997fb36db1f4b55e4e2faeaee38cd6c9f73be13194148475d51b345306bc15c
-
SHA512
81496ac02a64769349a80d59fc1160e96aa63a52a3afdd14a58a301b7e3dc984bcb033113d1143665c2dbca43d1c32ac360a0556fb8dc0caf6cf9f1f8ada4007
-
SSDEEP
768:JHf5g7/MjN3Ha4LWqY+5cpSMuRRRzv4/+5jUjga:tW70x6ALBw2a
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2252-0-0x0000000010000000-0x000000001004B000-memory.dmp upx behavioral1/memory/2252-1-0x0000000010000000-0x000000001004B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2472 2252 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2472 2252 d47a0cd165ce5b35618c9323b573d7e5.exe 29 PID 2252 wrote to memory of 2472 2252 d47a0cd165ce5b35618c9323b573d7e5.exe 29 PID 2252 wrote to memory of 2472 2252 d47a0cd165ce5b35618c9323b573d7e5.exe 29 PID 2252 wrote to memory of 2472 2252 d47a0cd165ce5b35618c9323b573d7e5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47a0cd165ce5b35618c9323b573d7e5.exe"C:\Users\Admin\AppData\Local\Temp\d47a0cd165ce5b35618c9323b573d7e5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 1602⤵
- Program crash
PID:2472
-