Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 14:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
hostr.exe
Resource
win7-20240903-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
hostr.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
hostr.exe
-
Size
105KB
-
MD5
5a559b6d223c79f3736dc52794636cfd
-
SHA1
5c4676b37fcd49990d21960a2df57af72ceef29a
-
SHA256
6f201afc797370ac6e33fafec41a794a2eb44c1bfd7d9079e3633ebe7bbb41e1
-
SHA512
7a12510fe2104a1860bccdd12d96449eb8b02e30f9757bf3fbb4aef3373c710afbaef380ad7f4b1f9fa8129d8bdc096b8f16cb6b1aada0495dba80db33fb9ce2
-
SSDEEP
1536:aDYEasJqkUssXOcfaAJzYU4r/1CbSYlIePDVFkhgIJZH:aasJjUfFOderYRH
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3428 set thread context of 4372 3428 hostr.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 4484 4372 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hostr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3428 hostr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86 PID 3428 wrote to memory of 4372 3428 hostr.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\hostr.exe"C:\Users\Admin\AppData\Local\Temp\hostr.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\hostr.exeC:\Users\Admin\AppData\Local\Temp\hostr.exe2⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 803⤵
- Program crash
PID:4484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4372 -ip 43721⤵PID:2120