Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 11:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Ödeme onayı.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
Ödeme onayı.exe
-
Size
810.6MB
-
MD5
467f7cbaf02335a9c92745bf88f6bd4f
-
SHA1
bdde0d6a94a4d40cd3fecfb33ddff0d77727d233
-
SHA256
d7eed63546caf4b8351e4dd2f87ffb46579177b2c6c559d019f2af86009e4821
-
SHA512
8b103e68a68bfdaf830ab41f168274cad1b8896506c0219df8c4ba4060f9e57d5967dfdd9351f971ee35ec9f9ed7d9fd844ef48dc1ae0b2288b953613a08038f
-
SSDEEP
1536:bjqr2ex0i4wnVqlBPwSP2nYQsH630VDH:bjqKex0i4wnVwwKlsEVDH
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2064 2080 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ödeme onayı.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2080 Ödeme onayı.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2064 2080 Ödeme onayı.exe 30 PID 2080 wrote to memory of 2064 2080 Ödeme onayı.exe 30 PID 2080 wrote to memory of 2064 2080 Ödeme onayı.exe 30 PID 2080 wrote to memory of 2064 2080 Ödeme onayı.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ödeme onayı.exe"C:\Users\Admin\AppData\Local\Temp\Ödeme onayı.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 12282⤵
- Program crash
PID:2064
-