Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 04:11

General

  • Target

    4164ebc98e2d1d030fbe04af9032d653099727c1b557a29a740d83f95977afe3.exe

  • Size

    666KB

  • MD5

    d2e410b2be268ced61c6148ae1b4580c

  • SHA1

    1b46a32d7c621a756ed187d6b261b4549ab809e6

  • SHA256

    4164ebc98e2d1d030fbe04af9032d653099727c1b557a29a740d83f95977afe3

  • SHA512

    c571f38036c5b12eb4cba3d2b1137a2f92c958b65ee8744d5fa988f328fd2718a1102d47d59e6c06a8af1760d36524b40a0ecd1522ff9f023490279f66c8a4c4

  • SSDEEP

    12288:F3KS4F8NYOJHeaRMwi8hin6IDQoyazsfeMj3FP1Jd8ssn3uMR8cfqfKiDu:z4qNJTiuCwdFnWss3zLSRC

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4164ebc98e2d1d030fbe04af9032d653099727c1b557a29a740d83f95977afe3.exe
    "C:\Users\Admin\AppData\Local\Temp\4164ebc98e2d1d030fbe04af9032d653099727c1b557a29a740d83f95977afe3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4828
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 268
      2⤵
      • Program crash
      PID:2608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 4828
    1⤵
      PID:3592

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4828-0-0x0000000000750000-0x00000000007C2000-memory.dmp

            Filesize

            456KB

          • memory/4828-2-0x0000000000570000-0x0000000000571000-memory.dmp

            Filesize

            4KB

          • memory/4828-1-0x0000000077BE2000-0x0000000077BE3000-memory.dmp

            Filesize

            4KB

          • memory/4828-3-0x0000000000750000-0x00000000007C2000-memory.dmp

            Filesize

            456KB