Analysis
-
max time kernel
110s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 12:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
536e02ca98212e70c50d5ee642c1c7a0N.exe
Resource
win7-20240704-en
5 signatures
120 seconds
General
-
Target
536e02ca98212e70c50d5ee642c1c7a0N.exe
-
Size
4.4MB
-
MD5
536e02ca98212e70c50d5ee642c1c7a0
-
SHA1
20e3b07507bd1bb2be307fc8e6d10ed50abe7b8f
-
SHA256
373ac846d6dc5862815fb568e6a98b69a4bd5d5aa2462d8fdbc4cb79542f38be
-
SHA512
028d320930f9b00fa2423d7d9362b30a87c64a9744f6cddebba35a61bb88508f841270dd523f9dceeb1439706a8b43392a1bd0652f07c5c6272839e2ecf090ec
-
SSDEEP
98304:eYyRs0kMrItH86zUBqajykMW2AC2304WjgwDA:gXChjzUykMW2AC7jg7
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe 536e02ca98212e70c50d5ee642c1c7a0N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 536e02ca98212e70c50d5ee642c1c7a0N.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 536e02ca98212e70c50d5ee642c1c7a0N.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 536e02ca98212e70c50d5ee642c1c7a0N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 536e02ca98212e70c50d5ee642c1c7a0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 592 2472 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 536e02ca98212e70c50d5ee642c1c7a0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2472 536e02ca98212e70c50d5ee642c1c7a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 592 2472 536e02ca98212e70c50d5ee642c1c7a0N.exe 28 PID 2472 wrote to memory of 592 2472 536e02ca98212e70c50d5ee642c1c7a0N.exe 28 PID 2472 wrote to memory of 592 2472 536e02ca98212e70c50d5ee642c1c7a0N.exe 28 PID 2472 wrote to memory of 592 2472 536e02ca98212e70c50d5ee642c1c7a0N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\536e02ca98212e70c50d5ee642c1c7a0N.exe"C:\Users\Admin\AppData\Local\Temp\536e02ca98212e70c50d5ee642c1c7a0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 1522⤵
- Program crash
PID:592
-