Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe
Resource
win7-20240729-en
General
-
Target
b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe
-
Size
91KB
-
MD5
cf7f92c501249a10ff38b31ff0ec0f9d
-
SHA1
9b169ecfb2042531a763086caab15d231ea2868a
-
SHA256
b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5
-
SHA512
2d2c6845f4fde66a119ea63967611d09407303c4ecd14e6a4f084035319776e69e0251f69c2cbe93e39f1d01b40b3ee506e9a855a0351944ab5e0e833ec2728d
-
SSDEEP
768:NMpQNwC3BEddsEqOt/hytp+x3BEJwRrSXOQ69zbjlAAX5e9zWY:yeTce/U/hKYuKSizbR9Xwzn
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process 2140 2008 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exedescription pid Process procid_target PID 2008 wrote to memory of 2140 2008 b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe 30 PID 2008 wrote to memory of 2140 2008 b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe 30 PID 2008 wrote to memory of 2140 2008 b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe 30 PID 2008 wrote to memory of 2140 2008 b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe"C:\Users\Admin\AppData\Local\Temp\b55f3cb2ea58eb8c378eedad4c3192e2e364a61afcd733a0cf244d87dd13b4b5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 362⤵
- Program crash
PID:2140
-