Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 15:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8cb783ad7005f8df649bd8f875959390N.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
8cb783ad7005f8df649bd8f875959390N.exe
-
Size
4.8MB
-
MD5
8cb783ad7005f8df649bd8f875959390
-
SHA1
8264582fb5e14de0c9eb0ddb564a2bcdb27da235
-
SHA256
bd880ae6f02d3db47e428a65ec1849f0e1754b603b7f88318d30f45acbcc9b72
-
SHA512
deb0bdf8ed556c14e0fa11bd21ab73efa6cfdf08ddf37881a4025d6184a8190dc1d3de4458a952dd8a9eb63351376c90089df5b6bd1771b54732c67a81e7f364
-
SSDEEP
49152:916jZg1DvQtV6sqFefM6xK5u3z+pSV4x9BLZmU6X9KpLbQQ4oda133/9kpr:iji1SBqFebRz+hR
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4956 1992 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cb783ad7005f8df649bd8f875959390N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1992 8cb783ad7005f8df649bd8f875959390N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1992 8cb783ad7005f8df649bd8f875959390N.exe Token: SeDebugPrivilege 1992 8cb783ad7005f8df649bd8f875959390N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1992 wrote to memory of 4956 1992 8cb783ad7005f8df649bd8f875959390N.exe 31 PID 1992 wrote to memory of 4956 1992 8cb783ad7005f8df649bd8f875959390N.exe 31 PID 1992 wrote to memory of 4956 1992 8cb783ad7005f8df649bd8f875959390N.exe 31 PID 1992 wrote to memory of 4956 1992 8cb783ad7005f8df649bd8f875959390N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb783ad7005f8df649bd8f875959390N.exe"C:\Users\Admin\AppData\Local\Temp\8cb783ad7005f8df649bd8f875959390N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 6442⤵
- Program crash
PID:4956
-