Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 04:54
Behavioral task
behavioral1
Sample
1928-936-0x0000000000B90000-0x00000000012BC000-memory.exe
Resource
win7-20240729-en
2 signatures
150 seconds
General
-
Target
1928-936-0x0000000000B90000-0x00000000012BC000-memory.exe
-
Size
7.2MB
-
MD5
abde43de4d15dca9be2682823d5f6e81
-
SHA1
65e4bb9275c0f1e892ea21cf461f77f9e1efd405
-
SHA256
f9e404834f08db3d3b498cc82fb7da09794ca030c169735800b84bff61ed26c4
-
SHA512
557910d899f9d758c2b7d8bd3a35105d4582f1ea118ed84c91205de0dfeb641c182718b1d0272bfc70afa1248e963ba0df826a245056cd6cfb55ba76341cfdcd
-
SSDEEP
98304:N+GJtF4RIwybWQYYiG1mVwy+SepG3fXwSJPpAkg24GR/YUa6:IGh6ybCjepeowpJ/K6
Malware Config
Signatures
-
Stealc family
-
Program crash 1 IoCs
pid pid_target Process procid_target 1772 2220 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1928-936-0x0000000000B90000-0x00000000012BC000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1928-936-0x0000000000B90000-0x00000000012BC000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1928-936-0x0000000000B90000-0x00000000012BC000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2162⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2220 -ip 22201⤵PID:2776