Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
b73125b07bab2bc0b6f36a3eb6e6fca0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b73125b07bab2bc0b6f36a3eb6e6fca0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b73125b07bab2bc0b6f36a3eb6e6fca0N.exe
-
Size
1.3MB
-
MD5
b73125b07bab2bc0b6f36a3eb6e6fca0
-
SHA1
421076a9b2de6a95e1a35d4532737b520c20a54d
-
SHA256
3da3c409ce431d4225ed8dd910fe62e40b6aae01ec6c9af2282b229af919fac4
-
SHA512
09d1e00576dd5dfc5b54c42e1e66a740804674afbd04b23dc6952f8278d6fa2b05394c84fa0fa439a3c073d0e4ea4147581e6e0646535ea283a27e6fcd4dc71f
-
SSDEEP
24576:DBt67PXdO5IbytHvSllVBL58RzLPVEIRdPWrIqeNCyKVVPJ:DbGXdnb2HvSlZL5QDVnP80QyKp
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3056 768 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b73125b07bab2bc0b6f36a3eb6e6fca0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 768 wrote to memory of 1056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 30 PID 768 wrote to memory of 1056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 30 PID 768 wrote to memory of 1056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 30 PID 768 wrote to memory of 1056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 30 PID 768 wrote to memory of 3056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 31 PID 768 wrote to memory of 3056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 31 PID 768 wrote to memory of 3056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 31 PID 768 wrote to memory of 3056 768 b73125b07bab2bc0b6f36a3eb6e6fca0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b73125b07bab2bc0b6f36a3eb6e6fca0N.exe"C:\Users\Admin\AppData\Local\Temp\b73125b07bab2bc0b6f36a3eb6e6fca0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\b73125b07bab2bc0b6f36a3eb6e6fca0N.exeCOHO2⤵PID:1056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 922⤵
- Program crash
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD59134669f44c1af0532f613b7508283c4
SHA11c2ac638c61bcdbc434fc74649e281bcb1381da2
SHA2567273854d0e9b34a60907bdde8293415a0f6edd6b8b1ef3957fcabd584be869a2
SHA512ada8e9c829abcba64641eb0a937c317e2a81494545eaeac4f909395ee739f8b519e331eed7ff67f5960c18029b1a48906f1bcf438f7e3a1e8c13b78fe8aed232