Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 01:23

General

  • Target

    68106b46f3a5b2e3e055accd9fecb2c55d818ecda90c4be7d4095b8e8ba610d1.exe

  • Size

    940KB

  • MD5

    d0a14727b42ab54cb0ab209e6cf1a6a5

  • SHA1

    0ac032532d4c31af4b5e938cb6a8a387f2f4c0c5

  • SHA256

    68106b46f3a5b2e3e055accd9fecb2c55d818ecda90c4be7d4095b8e8ba610d1

  • SHA512

    c04f39d1c9ef56a8789797ae839d8c8dbd0478130cf7917a13e92cd424ce1fcc262ddbcd06cd0eae0dede02a840d7ee34960d1bfdcb61ed16c329302f822a2ba

  • SSDEEP

    24576:bwXqpw7d1MkClv4H0zSr971nxHdQ0b4jC:odMkClv4HJLVd54jC

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68106b46f3a5b2e3e055accd9fecb2c55d818ecda90c4be7d4095b8e8ba610d1.exe
    "C:\Users\Admin\AppData\Local\Temp\68106b46f3a5b2e3e055accd9fecb2c55d818ecda90c4be7d4095b8e8ba610d1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 108
      2⤵
      • Program crash
      PID:2756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2496-0-0x0000000000080000-0x0000000000081000-memory.dmp

          Filesize

          4KB