Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 20:17

General

  • Target

    2dcfa329e67bf3e5f5740a0ac354b53abeda964a7f467ed0589b9a4c8383b314.exe

  • Size

    265KB

  • MD5

    64942f3a9dde9464bedf3ff9556607c8

  • SHA1

    578ca6dcb66d765bcc2405aea5c4e88accd5ef11

  • SHA256

    2dcfa329e67bf3e5f5740a0ac354b53abeda964a7f467ed0589b9a4c8383b314

  • SHA512

    7664569c9dbf1c29bbabe8c7c0a02beec1da747d054f059cd30527d4737c13402e500d14d5d685fcca8b37779fe4111e40dbe3fab42d6ba15ab0c70b571603a7

  • SSDEEP

    6144:nOfAeNdxOLoTLp103ETiZ0moGP/2dga1mcyw7I:neNPOCpScXwuR1mK7

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dcfa329e67bf3e5f5740a0ac354b53abeda964a7f467ed0589b9a4c8383b314.exe
    "C:\Users\Admin\AppData\Local\Temp\2dcfa329e67bf3e5f5740a0ac354b53abeda964a7f467ed0589b9a4c8383b314.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 140
      2⤵
      • Program crash
      PID:1040

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2080-0-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB

        • memory/2080-2-0x0000000000400000-0x0000000000457000-memory.dmp

          Filesize

          348KB