Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:11

General

  • Target

    uzumdnygfv.exe

  • Size

    116KB

  • MD5

    259e6385e66fb2fb767d9890621d97d5

  • SHA1

    4d1f445199912de9b44ceda0fba6a42eaa73c79a

  • SHA256

    a39611e75ae56a71d3266f2ede64e92ba3fcccca6d626603363d3e8397ed4ed4

  • SHA512

    fb384a1b6767349e4d01c75b173008b839308b4e8c5c23bc0ceb10384be6af2caee22455b1e317abaa93e83ccd98a9b503997c3a51604ca9002539947511b797

  • SSDEEP

    1536:icduOHhl2ALPOUofhDccdB+/yaErwz5EXMrZfCmJ+wqojNLE5jAWn9/c8r2523sM:bIQwALPSfOO+3s8KC+w/1E5ZfryLBq

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uzumdnygfv.exe
    "C:\Users\Admin\AppData\Local\Temp\uzumdnygfv.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 200
      2⤵
      • Program crash
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads