Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 15:29

General

  • Target

    da52462b60ba4e20c916209434980370N.exe

  • Size

    37KB

  • MD5

    da52462b60ba4e20c916209434980370

  • SHA1

    5a7eea445197d88ccd196e82a6e967a157306d02

  • SHA256

    50bfec151ffccf4bf205e6515ff87b4c569858e31efa72d1cd2cf779f2c0584a

  • SHA512

    88c2698e43b0893135428202cb2cee0192ba943c777cacd5a50f41b4f83b2715e9425dac69825750772fce12529f0f8fe09ef6bb74bd38fb2ba7edcb9d737645

  • SSDEEP

    384:UdPBU5cX6CvPVJksfhrdMVXyLV/Fe/3LXBjQr1D2u+4EcVJ7nYnI8aW9:N5S9vPfksJp2yVFEbB0BDha8DyI8z

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da52462b60ba4e20c916209434980370N.exe
    "C:\Users\Admin\AppData\Local\Temp\da52462b60ba4e20c916209434980370N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 176
      2⤵
      • Program crash
      PID:340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1720-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1720-4-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1720-9-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB