Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 05:23

General

  • Target

    d9bd7d7110bf9a258786353c226ee261ff5a36f6b87087da28ecb1d5e21c90c0N.exe

  • Size

    1.6MB

  • MD5

    02137bdf106eadfb912260d129eb3510

  • SHA1

    53d491ccdf2a65dc2ded1f9391045a8680a80ac6

  • SHA256

    d9bd7d7110bf9a258786353c226ee261ff5a36f6b87087da28ecb1d5e21c90c0

  • SHA512

    ed4800ba2bd770fb32dc6b69092bc3a63832e8b8864bc3e1b5beea778eb072c19cebb719c46a79f2a4072932073e1740019731296ec17be4c2fb4175c8f080e1

  • SSDEEP

    24576:DXaRicFDnikUa0BVdybnnavdZ/VESwGMx0/J2Gn20YU/3eRwGSa2Y:r6ikU0bnaT/VESGIJ2h0Y0ORsa2

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9bd7d7110bf9a258786353c226ee261ff5a36f6b87087da28ecb1d5e21c90c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d9bd7d7110bf9a258786353c226ee261ff5a36f6b87087da28ecb1d5e21c90c0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 1004
      2⤵
      • Program crash
      PID:2720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2104 -ip 2104
    1⤵
      PID:4572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2104-0-0x0000000000400000-0x00000000005BD000-memory.dmp

      Filesize

      1.7MB

    • memory/2104-1-0x0000000002E40000-0x0000000002E42000-memory.dmp

      Filesize

      8KB

    • memory/2104-4-0x000000000048F000-0x0000000000490000-memory.dmp

      Filesize

      4KB

    • memory/2104-5-0x000000000BE90000-0x000000000BE92000-memory.dmp

      Filesize

      8KB

    • memory/2104-7-0x0000000000400000-0x00000000005BD000-memory.dmp

      Filesize

      1.7MB

    • memory/2104-21-0x0000000000400000-0x00000000005BD000-memory.dmp

      Filesize

      1.7MB

    • memory/2104-22-0x0000000000400000-0x00000000005BD000-memory.dmp

      Filesize

      1.7MB