Analysis
-
max time kernel
15s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
6e34dc7fd017318842b76d4ae684c3f0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6e34dc7fd017318842b76d4ae684c3f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
6e34dc7fd017318842b76d4ae684c3f0N.exe
-
Size
268KB
-
MD5
6e34dc7fd017318842b76d4ae684c3f0
-
SHA1
7d81567a328be2fa446f063343322019d3085d8b
-
SHA256
34f75710cb681c5aa903f065a74ccbe70a13cb8d0f5c8884c8917c76e8ed86b8
-
SHA512
d5e3e45494e9d63df76a2d0fd3a146186bf25d3ecc6cae0794ff28119374e36ad3bf0c8fdb49d83d83790a64d9f3e32bf69ccdd02c33da362b938e88de25123b
-
SSDEEP
3072:cjtJIQU1ozn5Xol5tOhfz/kP11hwjYYLA7M+HmiWJlCu0xcfjtHX8:cjtLUY5XKty/klHYLAM+GiW19X8
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2344 3048 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e34dc7fd017318842b76d4ae684c3f0N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3048 6e34dc7fd017318842b76d4ae684c3f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2344 3048 6e34dc7fd017318842b76d4ae684c3f0N.exe 31 PID 3048 wrote to memory of 2344 3048 6e34dc7fd017318842b76d4ae684c3f0N.exe 31 PID 3048 wrote to memory of 2344 3048 6e34dc7fd017318842b76d4ae684c3f0N.exe 31 PID 3048 wrote to memory of 2344 3048 6e34dc7fd017318842b76d4ae684c3f0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e34dc7fd017318842b76d4ae684c3f0N.exe"C:\Users\Admin\AppData\Local\Temp\6e34dc7fd017318842b76d4ae684c3f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 2042⤵
- Program crash
PID:2344
-