Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
Resource
win10v2004-20240730-en
General
-
Target
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe
-
Size
6.8MB
-
MD5
45c2cbb28e1894d6df1318c09622bfb4
-
SHA1
12b8c3a64fbb30735add0224cd99b97dcef84a15
-
SHA256
14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4
-
SHA512
8f700dc6ca4b10802c4c010b34b6fc42da2a9b681215c22d938d66efc14060a6f81ae11e75c348a07851b737497b86d07a53d5356e3fc0540b52db5574761305
-
SSDEEP
196608:DOZ3h28qGHHC3h9Lgk4qPJp0GgvCIAQ4c:DOZ388P6h90k4EZgvCm4c
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 812 1716 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 812 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 28 PID 1716 wrote to memory of 812 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 28 PID 1716 wrote to memory of 812 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 28 PID 1716 wrote to memory of 812 1716 14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe"C:\Users\Admin\AppData\Local\Temp\14460a02b820a42ff96e08b80a31140d71affb65458b90bfd966dd73bd68bee4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 4802⤵
- Program crash
PID:812
-