Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 19:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Maskify.cc.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
300 seconds
General
-
Target
Maskify.cc.exe
-
Size
1.7MB
-
MD5
dc67fb9e861d861b7f8d27db27aa2dfc
-
SHA1
614dc2e1d36f6f3d9f6ecfa814c7c165d185e42b
-
SHA256
795af86d784540720986a7f2e6127717443156eb80c4d9cc8f3fb1496afaf842
-
SHA512
a8645c99c5b19f585c36ee1efa485b29827449f62d8664bb55669e72950eaaf3f9c9c3d17a3dfc94bcc1e1f004682c215f555372ae43474d7c8e37d3d695946c
-
SSDEEP
49152:2pkcK3GphIElHcsDBsDPsDdK3GphIElHcsDotK3GphIElH:sK3GpaElHrSYBK3GpaElHrEtK3GpaElH
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2512 2420 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Maskify.cc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2512 2420 Maskify.cc.exe 30 PID 2420 wrote to memory of 2512 2420 Maskify.cc.exe 30 PID 2420 wrote to memory of 2512 2420 Maskify.cc.exe 30 PID 2420 wrote to memory of 2512 2420 Maskify.cc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Maskify.cc.exe"C:\Users\Admin\AppData\Local\Temp\Maskify.cc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 6242⤵
- Program crash
PID:2512
-