Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 01:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
P24002603.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
P24002603.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
P24002603.exe
-
Size
1.6MB
-
MD5
2cb3df39c11f3e96ad05eda60cd28add
-
SHA1
99d31264de3bc568577cf0b98add9fc0c5e19f30
-
SHA256
669753cc3900f92adbf456fddd0f6ae176b44874bff3bb4a6111540ef1e7541b
-
SHA512
289fab87a4a30b5443931e663ab8ba37dd631423b4e3ef28531eb2ec23e7c1cface7dcd477da48eae81dc92f8d9152200d47e891d019e135d4a46b6ae34bcba2
-
SSDEEP
24576:wP1cZeBM6+th2ezQWaQJEyO6pkrJT5fHGayxNHVztzr71IPFEDK6iT28n+9i:wifthCHQJ/klT5fHGdbrRgFLBT2Q+9
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pemjev = "C:\\Users\\Admin\\AppData\\Roaming\\Pemjev.exe" P24002603.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4612 2528 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P24002603.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2528 P24002603.exe 2528 P24002603.exe 2528 P24002603.exe 2528 P24002603.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2528 P24002603.exe Token: SeDebugPrivilege 2528 P24002603.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4612 2528 P24002603.exe 32 PID 2528 wrote to memory of 4612 2528 P24002603.exe 32 PID 2528 wrote to memory of 4612 2528 P24002603.exe 32 PID 2528 wrote to memory of 4612 2528 P24002603.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\P24002603.exe"C:\Users\Admin\AppData\Local\Temp\P24002603.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 7882⤵
- Program crash
PID:4612
-