Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe
Resource
win10v2004-20240802-en
General
-
Target
d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe
-
Size
6.1MB
-
MD5
b6d7e0936a9b721dead00217f7c1edc9
-
SHA1
de2a5946264a3e06ee2a2e80ab338dc7e9d36486
-
SHA256
d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350
-
SHA512
4c313cb21be6950022c60d2ebed4bf96c1a92d13412e2271e1fe99e443628e6033841bd4affe395e09ef2633c37c4715da6f5000c6de7165c173f1e076ad54b8
-
SSDEEP
98304:GfK3k0cDe/fC5ljG5sxLpJ2VvdUAo5gtcAd9TEmoI7qe6pEWIGLs:t3k0HC5s5slvRAmA7Tshe9G4
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2644 2072 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2072 d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe 2072 d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2644 2072 d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe 31 PID 2072 wrote to memory of 2644 2072 d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe 31 PID 2072 wrote to memory of 2644 2072 d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe 31 PID 2072 wrote to memory of 2644 2072 d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe"C:\Users\Admin\AppData\Local\Temp\d492a7ff7a9f1f698e0abc23d76518db4ff76f8d400220cfc1f1b1dc08b07350.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2922⤵
- Program crash
PID:2644
-