Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:57
Behavioral task
behavioral1
Sample
4512-28-0x0000000000CD0000-0x0000000001406000-memory.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
4512-28-0x0000000000CD0000-0x0000000001406000-memory.exe
-
Size
7.2MB
-
MD5
9efe4d91bf5c9859afe8e279b2e8f4d7
-
SHA1
8f606c1043577e12c71b9ae710c8ebeaa1ecd56c
-
SHA256
955ab8a060ca12b35c6a66b0bff24cd1e3d9a1ffcd55412f7800cb66a57defec
-
SHA512
23b58ae2821a8a1035bd490ead5b1729eec246b13456d24daa9c60de6d2abb0890cd508b1a7d2b7f24494694c9b554b41020f3c81ae4c6d920b799962795acb6
-
SSDEEP
98304:0CGJtF4RIwybE68Jm1NwdxzWSxiKnchlUTNWdRDq4CPe/03:7Gh6ybE1fzWScKnc3VdRDqXPP3
Malware Config
Signatures
-
Stealc family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2488 4740 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4512-28-0x0000000000CD0000-0x0000000001406000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4512-28-0x0000000000CD0000-0x0000000001406000-memory.exe"C:\Users\Admin\AppData\Local\Temp\4512-28-0x0000000000CD0000-0x0000000001406000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 2162⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:752