Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe
Resource
win10v2004-20240508-en
General
-
Target
cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe
-
Size
892KB
-
MD5
7ac6d29dafd88ae158ba1987c312ae7c
-
SHA1
fda905af1fea4fd30e35fefaace705376bdb162c
-
SHA256
cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56
-
SHA512
e0c90129f74e03ee4d906383675fead75e1fd5dcde2b6501a7bacccb3d6173e86e81a388287812cccfb5533876123048d3ec39443fd2ff5094b9f655d1bbeaa7
-
SSDEEP
12288:+8ov/AoJiq/2Erig84ptXj6Zq/yeYOcUekIANrxSXwfBF0EAf:T+l2kiiptzkeYOcCEXwfBF0X
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exepid process 616 cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe 616 cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exedescription pid process target process PID 616 wrote to memory of 1300 616 cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe WerFault.exe PID 616 wrote to memory of 1300 616 cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe WerFault.exe PID 616 wrote to memory of 1300 616 cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe"C:\Users\Admin\AppData\Local\Temp\cf894f43d7f3604e9e5ffa253b06c2dd3856681f4a70c1d75e994c58b1018d56.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 616 -s 7242⤵PID:1300