Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 23:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Lucky.exe
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Lucky.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
Lucky.exe
-
Size
73KB
-
MD5
352b567c9c34359d9908b7f74b5f7466
-
SHA1
89c3e1ceb3fe9cfb2b760dbeb314cc5807a82191
-
SHA256
833af31aba36d0b1d147081d471ae86e1d9d426a1a568123d21c515aa49ebece
-
SHA512
188f13a4ab58dbc34ef04ba3abd2e7fad53bd28306a65ee2eb4164fb05a7646e30ef3f80a126e5ec460a711faadc181c3fa023adf1bc4b176bcb732efae66344
-
SSDEEP
1536:oRQTHxZLS60ZBSaa9t1S0+YWxbeK2IuswNsYqW/1WDkB8l/qfXBO:gQjrLSVzG9fS0cbeK2ILwS7y1WDkBSYg
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2108 1680 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lucky.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2108 1680 Lucky.exe 30 PID 1680 wrote to memory of 2108 1680 Lucky.exe 30 PID 1680 wrote to memory of 2108 1680 Lucky.exe 30 PID 1680 wrote to memory of 2108 1680 Lucky.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lucky.exe"C:\Users\Admin\AppData\Local\Temp\Lucky.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 6242⤵
- Program crash
PID:2108
-