Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 01:49
Behavioral task
behavioral1
Sample
2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe
Resource
win10v2004-20240419-en
General
-
Target
2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe
-
Size
97.8MB
-
MD5
06dd7aeb509dea5a0e9144fc7144eb4a
-
SHA1
b5eae7cb0e4c3191a86b79a140adc14552214429
-
SHA256
2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7
-
SHA512
e4f7d583a66b1e7b197f9c35ffb570a6becfbb0aa323959e8dcecc7a39d6a0fa0783868f4175b250b5d3078f82a4f373d57ab2c13b2c964c314c16e561888841
-
SSDEEP
786432:WWXgFdAWTpQXBVBEEIVeHDWIBV0aMoSctbw17Qm+Lf0XeuGU:WWadAPKeh0ew1pH
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2756 2372 WerFault.exe 2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exedescription pid process Token: SeDebugPrivilege 2372 2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exedescription pid process target process PID 2372 wrote to memory of 2756 2372 2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe WerFault.exe PID 2372 wrote to memory of 2756 2372 2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe WerFault.exe PID 2372 wrote to memory of 2756 2372 2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe WerFault.exe PID 2372 wrote to memory of 2756 2372 2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe"C:\Users\Admin\AppData\Local\Temp\2144b0b74e847cbdd01cfa2df27477c00722a904cd1a967947169dba32d63ef7.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 7482⤵
- Program crash
PID:2756
-