Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 16:33
Behavioral task
behavioral1
Sample
dead.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
30 seconds
General
-
Target
dead.exe
-
Size
254KB
-
MD5
41a555bbc081356100cafdd006d3c096
-
SHA1
bf4f81ed8b698b9865098fccabff0bbbe3ca3255
-
SHA256
7e45b79940116f8a1de3a75f82e5209d0279d99479a24778e1590dd739b6ddf8
-
SHA512
1bc00d609264c523ab114e845a26edb9a611b927a583730880916f04efeee9c37c4529559a47854e422ab8530ab8edbb87754a755f50939c29e5a14e4b74efbc
-
SSDEEP
6144:+4oZo8KbOUtoAXAEeDh0x7axHU3FmRaW8ejI82V:9oZAOUo90ufIl
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/824-1-0x00000000001B0000-0x00000000001F6000-memory.dmp family_umbral -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3060 xpsrchvw.exe 3060 xpsrchvw.exe 3060 xpsrchvw.exe 3060 xpsrchvw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 824 wrote to memory of 2148 824 dead.exe 30 PID 824 wrote to memory of 2148 824 dead.exe 30 PID 824 wrote to memory of 2148 824 dead.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dead.exe"C:\Users\Admin\AppData\Local\Temp\dead.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 824 -s 5482⤵PID:2148
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2760
-
C:\Windows\System32\xpsrchvw.exe"C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Music\ConvertInvoke.easmx"1⤵
- Suspicious use of SetWindowsHookEx
PID:3060