Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 20:25
Behavioral task
behavioral1
Sample
8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe
Resource
win7-20240903-en
General
-
Target
8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe
-
Size
268KB
-
MD5
8d8aa54b0c0a3f1f4afb0b75c04a4450
-
SHA1
e2f282a67ce05ff1940a974051defac4649ab65c
-
SHA256
8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4
-
SHA512
1f067acc99ba56176404ed70ec894beb3f4a2abcdddf4783716ef5d14003dad5154059b7abec6d465abf9545994e09a9b7c24c39b96e6442196931f6e25ac6e6
-
SSDEEP
6144:GvR9o/cALHzDLqiRTON/vY47++t1MC4R/utYa99S2UH8:GvR9ULH3LqiR+X7vdEW6a99E8
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/1174126211287502920/XDstkXt2u1d5Lf7d1i20yIzekmk9ugb8Uvw6DAbEeaE8aoHUVbEZLce-uNuES9iumefz
-
payload_url
https://cdn.discordapp.com/attachments/819331742212161576/877226130640343090/newlog.gif
https://cdn.discordapp.com/attachments/819331742212161576/877227264864055327/clipboard.gif
https://cdn.discordapp.com/attachments/819331742212161576/877216643896459294/clipboard.gif
https://cdn.discordapp.com/attachments/819331742212161576/877223646391844904/savedat.gif
https://cdn.discordapp.com/attachments/819331742212161576/877225829988438026/growtopia.gif
https://cdn.discordapp.com/attachments/819331742212161576/877290738235351151/terraria.jpg
https://cdn.discordapp.com/attachments/819331742212161576/877299612392751124/terraria.gif
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2188 2228 WerFault.exe 8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exedescription pid process target process PID 2228 wrote to memory of 2188 2228 8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe WerFault.exe PID 2228 wrote to memory of 2188 2228 8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe WerFault.exe PID 2228 wrote to memory of 2188 2228 8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe WerFault.exe PID 2228 wrote to memory of 2188 2228 8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe"C:\Users\Admin\AppData\Local\Temp\8d89b8ff2b434f8324499d3f7b90f879e53f0d2f763bd61d934e8d1bd31838d4N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 5482⤵
- Program crash
PID:2188
-