Analysis
-
max time kernel
163s -
max time network
286s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03/12/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
winrar-x64-701.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
winrar-x64-701.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
winrar-x64-701.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
winrar-x64-701.exe
-
Size
3.8MB
-
MD5
46c17c999744470b689331f41eab7df1
-
SHA1
b8a63127df6a87d333061c622220d6d70ed80f7c
-
SHA256
c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
-
SHA512
4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
SSDEEP
98304:6NRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAr:sR/gmeOqv7Ac9F0kB
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 248 ipconfig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 356 winrar-x64-701.exe 356 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3164 wrote to memory of 248 3164 cmd.exe 102 PID 3164 wrote to memory of 248 3164 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"C:\Users\Admin\AppData\Local\Temp\winrar-x64-701.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:356
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\f998fe7c9f8b49cf92f497101e8b5f60 /t 4304 /p 3561⤵PID:1524
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:248
-