Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe
Resource
win10v2004-20241007-en
General
-
Target
314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe
-
Size
6KB
-
MD5
02655c1c060280d64b0c2348ba998895
-
SHA1
c41d8d87d172a30635ea52afad32aa735682c651
-
SHA256
314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669
-
SHA512
f4d3546b2f5c2e8b96b7a03304be5118767dcb44603362b70b706362c778a50e1a5a820d4a9143f2a06e3f704718d88e822c7939c2f1030ea18cc863dadf0e4b
-
SSDEEP
48:Sdbt0S4FVgCp471Ib4Fc/38+N7DYocHa23WlTpebVetFygFI5a2oxdVoZiG/9uxO:s0mIGnFc/38+N4ZHJWSY9FI5Wqqx
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1956 1504 314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe 30 PID 1504 wrote to memory of 1956 1504 314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe 30 PID 1504 wrote to memory of 1956 1504 314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe"C:\Users\Admin\AppData\Local\Temp\314fc527c5c7fd364ecb21bef91cef6dca1ce751cfb00f3357cbbbbf1a9ba669.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1504 -s 322⤵PID:1956
-