Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe
Resource
win10v2004-20240802-en
General
-
Target
d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe
-
Size
802KB
-
MD5
0727c0b50dd4987b0fcfa3d847ce0830
-
SHA1
bc1d3eeda661d446e182f8baae34751b0d7cee26
-
SHA256
d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29
-
SHA512
f498c3f9cbd4528ac5d824e8ac3bc8a4d48d0e9aee188a482bdc269e1b5d100d2ffd659f652c646cf333e94d254d0e9e4744fd1fb763003409316b7607338b48
-
SSDEEP
12288:/8HOjy5ne/z4doEY6VIqVqVqv04VYVC2kn8qCOdbpL9HDP7JLKyP4Ep56xApQieq:0HOjy57MMvJYTTih9HDDYcpC4
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2220 1288 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2220 1288 d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe 28 PID 1288 wrote to memory of 2220 1288 d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe 28 PID 1288 wrote to memory of 2220 1288 d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe 28 PID 1288 wrote to memory of 2220 1288 d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe"C:\Users\Admin\AppData\Local\Temp\d1dfdefda245c0368ecdb024c85f259d999f715a41508da1b3dcbd8258e6ae29N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 5522⤵
- Program crash
PID:2220
-