Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 00:23
Behavioral task
behavioral1
Sample
Ordine.Pdf___________________________________________________________________.exe
Resource
win7-20240705-en
1 signatures
150 seconds
General
-
Target
Ordine.Pdf___________________________________________________________________.exe
-
Size
46KB
-
MD5
45edea0d42e3cd341a097f3dbe3868d6
-
SHA1
fc85c1d444b317bf63b8c86b4a6301a90577703a
-
SHA256
463f69c2f3583d5d2ddc4b584d486f93307453e7f05dd708dbd1eb9ad8669da7
-
SHA512
3adb6743a5496b5ba79d950f4e2a059e2bc22782ce91ef0cdb208d3fc4433f38744310d3351a19c164b5e74a016ac770c35e1ebc06f8de382d558703f749b674
-
SSDEEP
768:hqU4yQsX2Ev2l/M/1y+5kWdBNQUIWNk8ocyKRrSV/yI5fb1oaHPyiIEYc:b4AMw1T5kMBNQUIWLyk5IxqaHXZt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2436-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2436-3-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1996 2436 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ordine.Pdf___________________________________________________________________.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ordine.Pdf___________________________________________________________________.exe"C:\Users\Admin\AppData\Local\Temp\Ordine.Pdf___________________________________________________________________.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 5762⤵
- Program crash
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2436 -ip 24361⤵PID:4188