Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe
Resource
win10v2004-20240508-en
General
-
Target
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe
-
Size
3.6MB
-
MD5
4612ade01722b4f3cb9c88bcd6db61b5
-
SHA1
34e337e07c1ee4f4eda66357de3544803317d996
-
SHA256
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129
-
SHA512
56edde55f56f002e76361251f4a655c347ff6ed18ba31e5bcb4842a57c36969f61a581f784c79385d562dc338f123e5885aeaf3f44f3114650093b91c1757502
-
SSDEEP
24576:pfXHVB7lh6GGcGUk+DX/4B4QmIEITvLidP5pHFq+cCThsgMpXFln2IvlOvqoAl7D:FHHQmIEQTidP5pHFq+NhUPOU+7X
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exepid process 2300 32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe 2300 32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exedescription pid process Token: SeDebugPrivilege 2300 32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exedescription pid process target process PID 2300 wrote to memory of 2540 2300 32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe WerFault.exe PID 2300 wrote to memory of 2540 2300 32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe WerFault.exe PID 2300 wrote to memory of 2540 2300 32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe"C:\Users\Admin\AppData\Local\Temp\32c7816099925f831d1a10f3df0c771f94b8757d6f3cb175bc37bf029453f129.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2300 -s 6962⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2300-0-0x000007FEF5153000-0x000007FEF5154000-memory.dmpFilesize
4KB
-
memory/2300-1-0x00000000001F0000-0x000000000058A000-memory.dmpFilesize
3.6MB
-
memory/2300-2-0x000007FEF5150000-0x000007FEF5B3C000-memory.dmpFilesize
9.9MB
-
memory/2300-3-0x000007FEF5153000-0x000007FEF5154000-memory.dmpFilesize
4KB
-
memory/2300-4-0x000007FEF5150000-0x000007FEF5B3C000-memory.dmpFilesize
9.9MB