Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
Resource
win10-20240611-en
General
-
Target
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe
-
Size
1.1MB
-
MD5
6c9e7815208530b2574368f8a70e5790
-
SHA1
61d5d998abbbfe9c6efd9d38b8c99a3b48f8a7de
-
SHA256
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782
-
SHA512
013b6ce1104d05cdd4587197c4e177ef13409db9c81084551450674833d3876a050035a4545a647a257538a2cb44aafaada534c9bfe8e2b5bcf6a9f2dcff134d
-
SSDEEP
12288:o6MAg23QY02Vmv+TmTT8GlTiWqRZ6KTNnGP+l9+dMR4WrEXpPRTt+WHI9D1shsoY:oKsnZZvqmUNssUdHH5TI/DE/ScisNE
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exedescription pid Process procid_target PID 2540 set thread context of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2384 2664 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exeRegAsm.exedescription pid Process procid_target PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 1408 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 31 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2336 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 32 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2540 wrote to memory of 2664 2540 c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe 33 PID 2664 wrote to memory of 2384 2664 RegAsm.exe 34 PID 2664 wrote to memory of 2384 2664 RegAsm.exe 34 PID 2664 wrote to memory of 2384 2664 RegAsm.exe 34 PID 2664 wrote to memory of 2384 2664 RegAsm.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe"C:\Users\Admin\AppData\Local\Temp\c0f8b5afad6fab4136affd308519c36e3779d597413d00e79e7f939bd7bae782.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2563⤵
- Program crash
PID:2384
-
-