Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 03:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
354c3e97d9d6a70851512d9a5e501610N.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
354c3e97d9d6a70851512d9a5e501610N.exe
-
Size
2.9MB
-
MD5
354c3e97d9d6a70851512d9a5e501610
-
SHA1
d7d912b318ba6d39c049306c53ac0c89843ada9d
-
SHA256
f00737e5f99822f4f25becb0681bb976d2ae201fe5a713e7bf5d45dd66d39061
-
SHA512
134cf7e17f075a592690c8339807690a0cb593b4ea55470204eba220b098b15ccaccf63ed197b7c89eff63809f857ea606fe5451122493109252f9e623fc7388
-
SSDEEP
49152:V22l2SFlFFHRiYjhpJbHS/QXZc+lS4vsgKSZFHRguABhTMspE/QDFr:ZVriY3syZcn4Pdg9vMs6QZr
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe 354c3e97d9d6a70851512d9a5e501610N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3024 1764 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1764 354c3e97d9d6a70851512d9a5e501610N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 3024 1764 354c3e97d9d6a70851512d9a5e501610N.exe 31 PID 1764 wrote to memory of 3024 1764 354c3e97d9d6a70851512d9a5e501610N.exe 31 PID 1764 wrote to memory of 3024 1764 354c3e97d9d6a70851512d9a5e501610N.exe 31 PID 1764 wrote to memory of 3024 1764 354c3e97d9d6a70851512d9a5e501610N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1522⤵
- Program crash
PID:3024
-