Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 06:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e795115169cc800de0392d6a675d58fd.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
e795115169cc800de0392d6a675d58fd.exe
-
Size
273KB
-
MD5
e795115169cc800de0392d6a675d58fd
-
SHA1
8dd75837e360ba1cb8acf5a3d348dd020a5da482
-
SHA256
17f929c1d40a7fd6f897c0b15ca9c44b2059cbccb3037c31619d87954659478e
-
SHA512
5fb6543e91de175bd365462a1cc87d6772e43b0effd3757b3e408b08a4de5a004de9a85e7f1d09578fa3bc6b6486c5f5016c1b879496582dbb39b2e62e168f38
-
SSDEEP
6144:s/wl9dobdtMJNPX459l2/FpnovRWf1RdSxWbkHg6O0:HdoRtMJRkQp2MY0QO0
Malware Config
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2876-0-0x0000000000EF0000-0x0000000000F38000-memory.dmp family_xehook -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1960 2876 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
e795115169cc800de0392d6a675d58fd.exedescription pid Process procid_target PID 2876 wrote to memory of 1960 2876 e795115169cc800de0392d6a675d58fd.exe 29 PID 2876 wrote to memory of 1960 2876 e795115169cc800de0392d6a675d58fd.exe 29 PID 2876 wrote to memory of 1960 2876 e795115169cc800de0392d6a675d58fd.exe 29 PID 2876 wrote to memory of 1960 2876 e795115169cc800de0392d6a675d58fd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e795115169cc800de0392d6a675d58fd.exe"C:\Users\Admin\AppData\Local\Temp\e795115169cc800de0392d6a675d58fd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 922⤵
- Program crash
PID:1960
-