Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 21:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
90ba7a222c90f3844f50b552e8a041b0N.exe
Resource
win7-20240708-en
5 signatures
120 seconds
General
-
Target
90ba7a222c90f3844f50b552e8a041b0N.exe
-
Size
2.9MB
-
MD5
90ba7a222c90f3844f50b552e8a041b0
-
SHA1
25f36dd046d5c572a54606cb9943f062951cba17
-
SHA256
f275bb8c528f71812469067ea0f23f72c8a2637563a190529791606ec6ae929a
-
SHA512
5ddeacd5c5083542d62663c5793695c742855d3ce32a5cd3534cd0b40cbbeb21d944f8966ff94d0fa96f76635316b86b9e3e78b2c07dba643a691720d97649fb
-
SSDEEP
49152:K2D/joakZb4DfW7oQRq/WXUKxZV4e1Cy5VuPZPFGV0uRwnPVBwKW:JjDwufW7oQRREsZViyHuhNGVRwPrNW
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe 90ba7a222c90f3844f50b552e8a041b0N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 90ba7a222c90f3844f50b552e8a041b0N.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 90ba7a222c90f3844f50b552e8a041b0N.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 90ba7a222c90f3844f50b552e8a041b0N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 90ba7a222c90f3844f50b552e8a041b0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1824 2536 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90ba7a222c90f3844f50b552e8a041b0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 90ba7a222c90f3844f50b552e8a041b0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1824 2536 90ba7a222c90f3844f50b552e8a041b0N.exe 31 PID 2536 wrote to memory of 1824 2536 90ba7a222c90f3844f50b552e8a041b0N.exe 31 PID 2536 wrote to memory of 1824 2536 90ba7a222c90f3844f50b552e8a041b0N.exe 31 PID 2536 wrote to memory of 1824 2536 90ba7a222c90f3844f50b552e8a041b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ba7a222c90f3844f50b552e8a041b0N.exe"C:\Users\Admin\AppData\Local\Temp\90ba7a222c90f3844f50b552e8a041b0N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1522⤵
- Program crash
PID:1824
-