Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
injectorV2.4.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
injectorV2.4.exe
-
Size
495KB
-
MD5
cc50342a5e8ec23330b0864fb94ea4e7
-
SHA1
d029c92b6fb6dc38a4cdd35554ca0b7e1b8f8123
-
SHA256
f0af63b4468d4369d5abd59fba594685f424a136332b358bfac9b76ea201be6a
-
SHA512
161e80e888aad08b2ba02c0fe7fa68856387e17942514daf5bde70190ef5567c995cca38936f0b18691af95f8c30bb9f4f4568a344ded7d10650a5db6054054d
-
SSDEEP
12288:9azuzEtDcRUKgz4IHgR95DO5pkMPLgoQB2Rtv5hS:9VzEC64IHo9VkNgVBGX
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3008 1496 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injectorV2.4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 3008 1496 injectorV2.4.exe 31 PID 1496 wrote to memory of 3008 1496 injectorV2.4.exe 31 PID 1496 wrote to memory of 3008 1496 injectorV2.4.exe 31 PID 1496 wrote to memory of 3008 1496 injectorV2.4.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\injectorV2.4.exe"C:\Users\Admin\AppData\Local\Temp\injectorV2.4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 922⤵
- Program crash
PID:3008
-