Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe
Resource
win10v2004-20241007-en
General
-
Target
64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe
-
Size
16KB
-
MD5
9fbfc38b0cf5c679314427b56a57c715
-
SHA1
341b3cbffcea9e6968faadf6bba57158c51e0b40
-
SHA256
64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90
-
SHA512
a64e9adbd86a7e466e511e654a65af478752b9119183b6137b4058fa7444020a0c23d2ef105557c7eb648d9c4a8600654c0b57f79630eef4762ab1fe97353fb4
-
SSDEEP
384:jx2bbBqcsjQFC8t+zFQ4f8LDa2QAH2QDWGNHZThtc:EqcsjQFzt+FfJ2KgtPe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2168 2900 64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe 31 PID 2900 wrote to memory of 2168 2900 64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe 31 PID 2900 wrote to memory of 2168 2900 64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe"C:\Users\Admin\AppData\Local\Temp\64c4bbc39a2a8101806e121fbc6cd6e544d00cf0acf8a79672e8a2e41dbb1f90.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2900 -s 5362⤵PID:2168
-