Analysis
-
max time kernel
361s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 13:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
jk.exe
Resource
win7-20240708-en
3 signatures
600 seconds
Behavioral task
behavioral2
Sample
jk.exe
Resource
win10v2004-20240802-en
8 signatures
600 seconds
General
-
Target
jk.exe
-
Size
1.2MB
-
MD5
d6b4418b0d1f98e68519d654f1933bca
-
SHA1
4fc84ac21873af8b6aa972d9310cd89499dfa214
-
SHA256
172c5d015724ea8221bc5a8a6852445d35e965c5c00e4c15a553ab409e65bab6
-
SHA512
286126ed7a534aa77306085f3857402f7f2a86e5d2602e9ba49e4d3eaab7bb6c8477968eb6619707ee8cea14f9bb485eec2faf25d4f66597c58b44006eac0034
-
SSDEEP
24576:OtDDTspiIh7VWEFXaVO81uolECSY9v0KcmX/GDv6GMyH2:OZEkIh7HTguom9SF/GDv6GMv
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1712 2368 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1712 2368 jk.exe 30 PID 2368 wrote to memory of 1712 2368 jk.exe 30 PID 2368 wrote to memory of 1712 2368 jk.exe 30 PID 2368 wrote to memory of 1712 2368 jk.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\jk.exe"C:\Users\Admin\AppData\Local\Temp\jk.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 6002⤵
- Program crash
PID:1712
-