Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2024 06:29

General

  • Target

    sample.exe

  • Size

    561KB

  • MD5

    af04642d86b2e7e785a034d8fd4510bd

  • SHA1

    82b4b45acdec6c64853c5d2c0df36c23026c2e73

  • SHA256

    cb46f693cb4263f0c8832e56fe42d8dd0e1a5e8c70b102e20322a65b428df9ce

  • SHA512

    762bcf964b6e9d693cd9984f84f1819fbd4a4924d0bb131157df8ac4b76a0df7113cd013a36230a2a726a7fdb2eb62338537e5c54bcbfa5b43934bc3190cb04c

  • SSDEEP

    12288:vfAYXkhMOoltiJKeGrLW02pIGyuJdaRQMn6iE30nYjk7L:tkh5oDiJKe4f5QdaRj6ipgk7

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 644
      2⤵
      • Program crash
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2132-0-0x0000000074A0E000-0x0000000074A0F000-memory.dmp

    Filesize

    4KB

  • memory/2132-1-0x00000000009B0000-0x0000000000A42000-memory.dmp

    Filesize

    584KB

  • memory/2132-2-0x0000000074A00000-0x00000000750EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2132-3-0x0000000074A00000-0x00000000750EE000-memory.dmp

    Filesize

    6.9MB