Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 04:21

General

  • Target

    8846d1d9bdc4ed5cce66ea1697b685bf87cab5f03290dfb07bfaed2b0de413c1N.exe

  • Size

    472KB

  • MD5

    e2ab234b76d99bed05eb0de1f97a39c0

  • SHA1

    4c7977388d9a8db5cef39ed0b3aad07361519ec5

  • SHA256

    8846d1d9bdc4ed5cce66ea1697b685bf87cab5f03290dfb07bfaed2b0de413c1

  • SHA512

    41bbf57a31195f66b2e49a71ae42f185ef64acc8f35a344a3cc6f418cfe9f2e7bbbcd8286064f5cceaf53afefcca90a6c468cfd83dea9dcf7b7c1edb19bc70b2

  • SSDEEP

    3072:K5c8RinudiP52xx67lLdxiHDob5v5+D7suJbIwcA:K5pkgiPA6R7Pb5v5PGIwF

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8846d1d9bdc4ed5cce66ea1697b685bf87cab5f03290dfb07bfaed2b0de413c1N.exe
    "C:\Users\Admin\AppData\Local\Temp\8846d1d9bdc4ed5cce66ea1697b685bf87cab5f03290dfb07bfaed2b0de413c1N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1992 -s 36
      2⤵
      • Program crash
      PID:1804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-1-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB