Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2024 18:48

General

  • Target

    Executor/Injector.exe

  • Size

    1.2MB

  • MD5

    9d6470e951494e2195189b03bf47c9c2

  • SHA1

    f99012e40e258b79f7b97b9efe91e7f01d93d5be

  • SHA256

    2c9f5f678d8c8448cab83d4a855100b347ce50ac7d495a156b72edf81389cc9a

  • SHA512

    fbe68915cd1445050a5e2450455425f66ad7cc1622eeb38a0a77f964af8c2c1008746dc12cc13b0339ec6a301a59f8edc6465c030f6b3eead2c038cbf1ed725d

  • SSDEEP

    24576:isMl5IXhqt4J3jo09c2ga8eFUJspf8fVuYX560FCX:ifTt4J3jo0M1sd8fRJVY

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Executor\Injector.exe
    "C:\Users\Admin\AppData\Local\Temp\Executor\Injector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 116
      2⤵
      • Program crash
      PID:356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2384-0-0x00000000003E0000-0x0000000000519000-memory.dmp

    Filesize

    1.2MB