Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 10:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe
-
Size
444KB
-
MD5
8410893f1f88c5d9ab327bc139ff295d
-
SHA1
64a1785683858d8b6f4e7e2b2fac213fb752bae0
-
SHA256
318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318
-
SHA512
4222f1c4bee57ef3864604c2df6f5190697c72ec8ec158f2bb82ad1ede2adba7c31a239a65a77e10408f581b7f921fd6126a3aabd85bb7c2c96baf43c1d11112
-
SSDEEP
6144:FAv4cqcUtBUmm60Lo6Dje6lNPPvKspCgOU7ApIT74aiIjTgJDWhgtU40FTjAt:yrqhtBUmm6bQe6f/Ks4gj7AC+DVtcjAt
Malware Config
Signatures
-
Detect WinDealer information stealer 1 IoCs
resource yara_rule behavioral1/memory/1772-0-0x0000000010000000-0x000000001003B000-memory.dmp family_windealer -
Program crash 1 IoCs
pid pid_target Process procid_target 2916 1772 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1772 318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe 1772 318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2916 1772 318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe 28 PID 1772 wrote to memory of 2916 1772 318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe 28 PID 1772 wrote to memory of 2916 1772 318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe 28 PID 1772 wrote to memory of 2916 1772 318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe"C:\Users\Admin\AppData\Local\Temp\318c431c56252f9421c755c281db7bd99dc1efa28c44a8d6db4708289725c318.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 2922⤵
- Program crash
PID:2916
-