Analysis
-
max time kernel
1562s -
max time network
1564s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
EVP3410001500995_1506489088-payment order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
EVP3410001500995_1506489088-payment order.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
EVP3410001500995_1506489088-payment order.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
EVP3410001500995_1506489088-payment order.exe
Resource
win11-20241007-en
General
-
Target
EVP3410001500995_1506489088-payment order.exe
-
Size
45KB
-
MD5
3d66305ed410fad27c043db895cdd385
-
SHA1
1038de840abc4effc9092a240c7fb8b088b7731b
-
SHA256
6ce2dc1aea1d062b35b2f1e1bb8ad276bede32a26e51581f996b4af620764863
-
SHA512
95d56b572aa8322b93a683e7827f6732c58f0c10f1cb41381df68072ecb6c58182ed418af4207f3e5666fd369224cafcc8ba8a5a3c9c71251abd58e0d65e719b
-
SSDEEP
384:d8vpxocE2w6L5FUGWe1fEt5m0Gg9azYUmreMRo5CRCV5uWn+FW:dIo/QnJ9gloz3MRRMi
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 6024 2868 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EVP3410001500995_1506489088-payment order.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 EVP3410001500995_1506489088-payment order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 EVP3410001500995_1506489088-payment order.exe Token: SeDebugPrivilege 2868 EVP3410001500995_1506489088-payment order.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 6024 2868 EVP3410001500995_1506489088-payment order.exe 31 PID 2868 wrote to memory of 6024 2868 EVP3410001500995_1506489088-payment order.exe 31 PID 2868 wrote to memory of 6024 2868 EVP3410001500995_1506489088-payment order.exe 31 PID 2868 wrote to memory of 6024 2868 EVP3410001500995_1506489088-payment order.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\EVP3410001500995_1506489088-payment order.exe"C:\Users\Admin\AppData\Local\Temp\EVP3410001500995_1506489088-payment order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 5202⤵
- Program crash
PID:6024
-