Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 05:00

General

  • Target

    634523078a9f59e13837e03ba905999eecafe16809e7159e70974f2e4aff9599N.exe

  • Size

    468KB

  • MD5

    8d541fb264ccd3ec3b07b27e4fa590c0

  • SHA1

    a126647229e307900b41b235b1692f2c632c779f

  • SHA256

    634523078a9f59e13837e03ba905999eecafe16809e7159e70974f2e4aff9599

  • SHA512

    f62f78d88cb8ed18683e6282d2288a1fe067f61f916e6217f204606e50c73eda4fdfcb61cd941d39c14229a6472922168278fb7f7d306dbf0b7a5d722d335349

  • SSDEEP

    3072:mbAoogIdId5UtbYCPzxjcf8/8CtkPIpShmHeLVhctev8/b8u3yl0:mbbowbUttPVjcfZ0igtekT8u3

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\634523078a9f59e13837e03ba905999eecafe16809e7159e70974f2e4aff9599N.exe
    "C:\Users\Admin\AppData\Local\Temp\634523078a9f59e13837e03ba905999eecafe16809e7159e70974f2e4aff9599N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 240
      2⤵
      • Program crash
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2192-0-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2192-3-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB