Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe
Resource
win10v2004-20240802-en
General
-
Target
4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe
-
Size
145KB
-
MD5
e57510c487b492a0e0fcebf7cb905a3e
-
SHA1
5f88f92299011e58838d89df0c51f0ba18e68790
-
SHA256
4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565
-
SHA512
98fed71dddc04e8291f30fced143c901ee15b604a89e52b1b2f2ff31bfc12ded8a0fd6608279cfd07a11d0f4e5c11ddef34c2a6ed55f46619e1d35c8587b0eaa
-
SSDEEP
3072:6GAguC2/FNGrlZeDinCbJnZZ/wFjJmFCyblxyL+BJl19WRjvWtHLSAyKp5:zf2NGrLeDigRZ92jJJy5xyAJl18RrGHJ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2064 2316 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2064 2316 4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe 30 PID 2316 wrote to memory of 2064 2316 4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe 30 PID 2316 wrote to memory of 2064 2316 4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe 30 PID 2316 wrote to memory of 2064 2316 4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe"C:\Users\Admin\AppData\Local\Temp\4fc04e6fdc2d924fc325b3775ee2252e98f7da083b1f4c54b646f4ad67e00565.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 882⤵
- Program crash
PID:2064
-