Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 12:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Jules.exe
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Jules.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
Jules.exe
-
Size
423KB
-
MD5
b5fbf5a1294ad6940c3e5f241fe6bf30
-
SHA1
89fe4331123efe0f1cdbcf083a0bcbb4a1daf455
-
SHA256
638e00df9d24c502ea69558ce590ca10ee711657dfcaba4d13a991a49517a91c
-
SHA512
f614ebb6128d1a2c38ce5c5ee04658d83dc91b51eb8e10bf3382cc176a466a4754955d5298d6679f4bc1ed4ab3261fb157f7678b70f8181af1e0cedf7a4e8073
-
SSDEEP
6144:tQ2J8rfffMUseuKzb9NGw46fzfJ7cfMPvzHc3fS/FEidMfcfWOzffxrXOvk3RFfo:tQbp2jGPvo6UYG
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2852 2724 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jules.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2852 2724 Jules.exe 30 PID 2724 wrote to memory of 2852 2724 Jules.exe 30 PID 2724 wrote to memory of 2852 2724 Jules.exe 30 PID 2724 wrote to memory of 2852 2724 Jules.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Jules.exe"C:\Users\Admin\AppData\Local\Temp\Jules.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 6282⤵
- Program crash
PID:2852
-