Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 14:22

General

  • Target

    Ref#10784512.exe

  • Size

    532KB

  • MD5

    08565a4a256fb8f4f3497c695991829f

  • SHA1

    b2c4d59213108fe33197e3685b1602f56047f62c

  • SHA256

    b5d25a995424fd4d4fe5303ca4e90ceeb2794989f58213bda32b29c8716c5cfb

  • SHA512

    af2abd0960d15c9dcb6b168318be8ea66b357c07bc23bfc74e4c0784300863798ead484b4b76ec802139fe9d737164df4d5db95b31601e715fb43003fa617799

  • SSDEEP

    6144:CecUj2wJOTSYPagobSxxIxx0xxxxxxxGsrw3IX7a6plD:CecE2wGGsLV

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ref#10784512.exe
    "C:\Users\Admin\AppData\Local\Temp\Ref#10784512.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 1136
      2⤵
      • Program crash
      PID:6420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2484-0-0x000000007456E000-0x000000007456F000-memory.dmp

    Filesize

    4KB

  • memory/2484-1-0x00000000010B0000-0x0000000001138000-memory.dmp

    Filesize

    544KB

  • memory/2484-2-0x0000000074560000-0x0000000074C4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-3-0x0000000006580000-0x0000000006670000-memory.dmp

    Filesize

    960KB

  • memory/2484-5-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-4-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-7-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-9-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-11-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-15-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-13-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-17-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-21-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-19-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-23-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-25-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-27-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-31-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-29-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-39-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-53-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-33-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-35-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-37-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-41-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-47-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-67-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-65-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-63-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-61-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-59-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-57-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-55-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-51-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-49-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-45-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-43-0x0000000006580000-0x000000000666B000-memory.dmp

    Filesize

    940KB

  • memory/2484-1180-0x000000007456E000-0x000000007456F000-memory.dmp

    Filesize

    4KB

  • memory/2484-1181-0x0000000074560000-0x0000000074C4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-1182-0x0000000074560000-0x0000000074C4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-1183-0x0000000005080000-0x00000000050E2000-memory.dmp

    Filesize

    392KB

  • memory/2484-1184-0x0000000005260000-0x00000000052AC000-memory.dmp

    Filesize

    304KB

  • memory/2484-1185-0x0000000074560000-0x0000000074C4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2484-1186-0x0000000004BF0000-0x0000000004C44000-memory.dmp

    Filesize

    336KB

  • memory/2484-1189-0x0000000074560000-0x0000000074C4E000-memory.dmp

    Filesize

    6.9MB