Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe
Resource
win7-20240903-en
General
-
Target
90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe
-
Size
94KB
-
MD5
f98e2cd75bd2f04583256ab4af637bd7
-
SHA1
130b948d05dc987bbcffa5b117f90fb3d0cf9851
-
SHA256
90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864
-
SHA512
fd9a8f116b51850d434330c01859c98707be3a66b61d17e3b7f35026a21d167e3e4dac0b4aa3976148f592fbf09e498c8a4bff58f87d028a9d6cad30525adf9d
-
SSDEEP
1536:f1wWHwEEe9jxhgfkHGU7+Xv0gNRmF/h9lCRTqWD:yW/9jnHGU7yv0CRm1SD
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1268 1960 WerFault.exe 90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exedescription pid process target process PID 1960 wrote to memory of 1268 1960 90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe WerFault.exe PID 1960 wrote to memory of 1268 1960 90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe WerFault.exe PID 1960 wrote to memory of 1268 1960 90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe WerFault.exe PID 1960 wrote to memory of 1268 1960 90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe"C:\Users\Admin\AppData\Local\Temp\90a48d2eb84a1e668d7d1cc50c1de5eedca070c4af9d862a021ce01300852864.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 962⤵
- Program crash
PID:1268
-