Analysis
-
max time kernel
110s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 22:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1e022fa33bc78d74597a2e1735024be0N.exe
Resource
win7-20240705-en
5 signatures
120 seconds
General
-
Target
1e022fa33bc78d74597a2e1735024be0N.exe
-
Size
664KB
-
MD5
1e022fa33bc78d74597a2e1735024be0
-
SHA1
0da94cccca3f6506e6bcc78378414b0a236a1ed8
-
SHA256
6b43979d2d2ac2b44c285f8ec7b54ab75e5c9483ba7c6bd5c3c5e9e08bb5c134
-
SHA512
69aecdbfcfaa51bc28f1e1d49c2bc280b44a49cd9b30db577a62aeded119888185e7e09d9a39cd3f19c30f9c8a1816fa7621f1242bbe39618ecad2761caa22bd
-
SSDEEP
12288:+F3ULO2IiSNvEw6MyyngSh6ntHrnFlgG/Ot6CPM40bDhieAdlW:+tsO2mNMdMygh6tHrnnno6CP
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe 1e022fa33bc78d74597a2e1735024be0N.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 1e022fa33bc78d74597a2e1735024be0N.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 1e022fa33bc78d74597a2e1735024be0N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 1e022fa33bc78d74597a2e1735024be0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 1e022fa33bc78d74597a2e1735024be0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2180 2508 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e022fa33bc78d74597a2e1735024be0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2508 1e022fa33bc78d74597a2e1735024be0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2180 2508 1e022fa33bc78d74597a2e1735024be0N.exe 29 PID 2508 wrote to memory of 2180 2508 1e022fa33bc78d74597a2e1735024be0N.exe 29 PID 2508 wrote to memory of 2180 2508 1e022fa33bc78d74597a2e1735024be0N.exe 29 PID 2508 wrote to memory of 2180 2508 1e022fa33bc78d74597a2e1735024be0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e022fa33bc78d74597a2e1735024be0N.exe"C:\Users\Admin\AppData\Local\Temp\1e022fa33bc78d74597a2e1735024be0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 1562⤵
- Program crash
PID:2180
-