Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 21:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
66b7d12b3a8ea_5k.exe
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
66b7d12b3a8ea_5k.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
66b7d12b3a8ea_5k.exe
-
Size
411KB
-
MD5
4bead3a1a9683a320959d1f0704e5c62
-
SHA1
938015c08e0862ce5380c2a5953e2b8700b636ae
-
SHA256
8e1628d8702e49c52d4fcb0df8f9872dc693c38e685243a0e0dd03594b899ea2
-
SHA512
035048d3df36b130c6497c342017714d2ace8d4cfc06adb5b511969f2373921f02294ed854edd64b1d54f82e138e6154220561aee3f2339a0be5c55fda597eed
-
SSDEEP
12288:0UVPgerhCT+SnR/on1QVk110E+fpnpTB:0UVYer86SnlMQVk1Ofp
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 2788 1512 66b7d12b3a8ea_5k.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 2788 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b7d12b3a8ea_5k.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 1512 wrote to memory of 2788 1512 66b7d12b3a8ea_5k.exe 30 PID 2788 wrote to memory of 2964 2788 RegAsm.exe 31 PID 2788 wrote to memory of 2964 2788 RegAsm.exe 31 PID 2788 wrote to memory of 2964 2788 RegAsm.exe 31 PID 2788 wrote to memory of 2964 2788 RegAsm.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b7d12b3a8ea_5k.exe"C:\Users\Admin\AppData\Local\Temp\66b7d12b3a8ea_5k.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 2563⤵
- Program crash
PID:2964
-
-