Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 22:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Byte Guard Free.exe
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
Byte Guard Free.exe
-
Size
2.4MB
-
MD5
32eee970bec927fd068197918edac5a4
-
SHA1
8aa4820931aa228856f12fc516f886dab4d12e28
-
SHA256
53eeff9f4fa0473d90cf4abe978ff60d5898d2527924a593ef877303cab88a5b
-
SHA512
d47d2fbc9d4b9a47d0b5b1076aaa89b20ba72a9625e9fcfd57f000bc14abc11aff60123667bbb6998fa5bdff65b7207f410cc6008207fc2362db1d99c80afbe8
-
SSDEEP
49152:3Ls8e8SkGMITYbNbNWo4kSH3OqtwI2MrBm6w30IfRaRf:3PecGMIT4bNJFY3OqtxdmDDJef
Score
6/10
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 1792 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Byte Guard Free.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1792 Byte Guard Free.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2748 1792 Byte Guard Free.exe 30 PID 1792 wrote to memory of 2748 1792 Byte Guard Free.exe 30 PID 1792 wrote to memory of 2748 1792 Byte Guard Free.exe 30 PID 1792 wrote to memory of 2748 1792 Byte Guard Free.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Byte Guard Free.exe"C:\Users\Admin\AppData\Local\Temp\Byte Guard Free.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 11202⤵
- Program crash
PID:2748
-