Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe
Resource
win10v2004-20240412-en
General
-
Target
c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe
-
Size
993KB
-
MD5
55853a89a9d4048b5438189c4df76c7a
-
SHA1
18998068b836d0f5b1c0a137b8344857b0a27036
-
SHA256
c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98
-
SHA512
08016375015d470d8a943188c61c51654d5efbfc4a48a9b9da174ccfa7f0b60bd541d0dbea3ad239870d7cc0744e2a6d186317d9d33e1301ba05e3f528e76280
-
SSDEEP
24576:+wC9Dwa+7y9s21o5bs/7oG43YjImoL6IwMe2JK:WSRs1oNsBjIlLI
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exedescription pid process Token: SeDebugPrivilege 2768 c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exedescription pid process target process PID 2768 wrote to memory of 2252 2768 c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe WerFault.exe PID 2768 wrote to memory of 2252 2768 c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe WerFault.exe PID 2768 wrote to memory of 2252 2768 c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe"C:\Users\Admin\AppData\Local\Temp\c3c4562cb71bcb338f1fd481baab2367d485c84ddeebf0e41a1ac97fb0104e98.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2768 -s 5802⤵PID:2252
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2768-0-0x0000000001100000-0x0000000001168000-memory.dmpFilesize
416KB
-
memory/2768-1-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmpFilesize
9.9MB
-
memory/2768-2-0x000000001B170000-0x000000001B1F0000-memory.dmpFilesize
512KB
-
memory/2768-3-0x000007FEF5BA0000-0x000007FEF658C000-memory.dmpFilesize
9.9MB
-
memory/2768-4-0x000000001B170000-0x000000001B1F0000-memory.dmpFilesize
512KB