Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 08:45
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
VSP469620.exe
Resource
win7-20240708-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
VSP469620.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
VSP469620.exe
-
Size
983KB
-
MD5
b8204c2309bbbaf3473266f2dcf3851e
-
SHA1
65d51529e0698579378a26d537b6d0d4b6602e5a
-
SHA256
a1d5e7e9410ec987b5399ae5f8f970b5e051efc97307188f02572ecdd7b9f516
-
SHA512
3db8f19c13fec07cf4542446f9d15e62b0c1c4af4efd200bfe8f99662f145aef04ea75599c7c4a5802b4ef993990d7cc663b9ba7b6e8957a9ab7c4961fe9cfe6
-
SSDEEP
24576:9tb20pkaCqT5TBWgNQ7anGrAEKqFf76A:uVg5tQ7anGrALID5
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2988 2440 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VSP469620.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2440 wrote to memory of 564 2440 VSP469620.exe 83 PID 2440 wrote to memory of 564 2440 VSP469620.exe 83 PID 2440 wrote to memory of 564 2440 VSP469620.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\VSP469620.exe"C:\Users\Admin\AppData\Local\Temp\VSP469620.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\VSP469620.exe"2⤵PID:564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 6482⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2440 -ip 24401⤵PID:1896