Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
5093699e2b2728073ebfe205b1e27778235dcf9aff5b7d25ad38f23aea9ec50c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5093699e2b2728073ebfe205b1e27778235dcf9aff5b7d25ad38f23aea9ec50c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
seuxwbcie.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
seuxwbcie.exe
Resource
win10v2004-20241007-en
General
-
Target
seuxwbcie.exe
-
Size
4KB
-
MD5
a76d9b231af273f403da413af9b6fe1d
-
SHA1
30c52ca472a94e2b9535468a84e19ba790472590
-
SHA256
86c1a081301f284a88a5e5e6004f4de35c01550119b159ba2fa43b144958e1b6
-
SHA512
25f41ebb2226a3b4e1f06d653345a1252d20a8fade7b6c2e474174cbcc6c071077ef849286fa23565d78f0cf55b9a5bd24c2df91916f1c49ec5aa090192a5aa9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1724 276 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seuxwbcie.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 1724 276 seuxwbcie.exe 31 PID 276 wrote to memory of 1724 276 seuxwbcie.exe 31 PID 276 wrote to memory of 1724 276 seuxwbcie.exe 31 PID 276 wrote to memory of 1724 276 seuxwbcie.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe"C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 276 -s 1562⤵
- Program crash
PID:1724
-