Analysis

  • max time kernel
    132s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 12:40

General

  • Target

    1880-31-0x0000000000400000-0x00000000004A2000-memory.exe

  • Size

    648KB

  • MD5

    22afa58ae2fa1b7b66163db4cfc92e33

  • SHA1

    15a2b9df0bd75375572301f463ee27c8e6f11a18

  • SHA256

    70a5c2abd62c4b375a6f714c79670a9b3e675d7e894e915872b191cb9b128ca5

  • SHA512

    53c142160520cb3766faced89f425a0a45791ea95f7de87f13c46f1b8b3ea5bdd3a6aae5499092da05f139252a6393ea65698fbd91f5784726ae9c2cf43c47d5

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/Eq3Izmd:nSHIG6mQwGmfOQd8YhY0/ECUG

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1880-31-0x0000000000400000-0x00000000004A2000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\1880-31-0x0000000000400000-0x00000000004A2000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 180
      2⤵
      • Program crash
      PID:3596
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4800 -ip 4800
    1⤵
      PID:3608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads