Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 21:40

General

  • Target

    VwMeter/VwUpdate.exe

  • Size

    278KB

  • MD5

    bff83d7bd87ae8e5426035b0c67affff

  • SHA1

    f868e80eae976dbda4f6e432e317986509057a13

  • SHA256

    24c625b3e0d41ac66006e047a9caf66bd5d7e4f36b487df3f12018ec8fc6fca1

  • SHA512

    1c8239caa14e0df5a86480f17cdab0b06933b784426984478f9968420cfea6813e7d603644f598bb7f04f08bc37d9e044754132e1f2a65d9a35fe9200017fcdc

  • SSDEEP

    6144:+O6UM3aCW3e0dZfFgCZTdsmnElPV1Z4F6TQAI5d/Grernu:CUAI1dTdxGmnOPV1y6T5V

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VwMeter\VwUpdate.exe
    "C:\Users\Admin\AppData\Local\Temp\VwMeter\VwUpdate.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2420-6-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2420-5-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2420-4-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2420-3-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2420-2-0x000000000044A000-0x000000000044B000-memory.dmp

    Filesize

    4KB

  • memory/2420-1-0x0000000000230000-0x00000000002B4000-memory.dmp

    Filesize

    528KB

  • memory/2420-0-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2420-7-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2420-8-0x000000000044A000-0x000000000044B000-memory.dmp

    Filesize

    4KB