Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10-12-2024 06:21

General

  • Target

    3609432610d1fbc5cb0a8b94539e3489.exe

  • Size

    326KB

  • MD5

    3609432610d1fbc5cb0a8b94539e3489

  • SHA1

    485a4bfd6d1b51824993626e7c56a08818a057c8

  • SHA256

    540df5c639021c723908d31a4c089c9f9f4fe9c363209f8d7a61117b957a44ac

  • SHA512

    d74e33e3d5dc239c5c442c3726977f2bc4fb42797f588d794dd779c31404671e606ac5876fbb665840b4bc47d1df88d3ba6edc422b9102b67305df3b8e79623a

  • SSDEEP

    6144:f3P1L3CcLciA9DvJS0NN+sSsjFofasnjoAZmRxmWtzid7UaNxVisqnyhLJ0EvgUd:f3P1TFLciAs7U+xVisX0UhPH

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3609432610d1fbc5cb0a8b94539e3489.exe
    "C:\Users\Admin\AppData\Local\Temp\3609432610d1fbc5cb0a8b94539e3489.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 168
      2⤵
      • Program crash
      PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads