Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 18:35
Behavioral task
behavioral1
Sample
220-0-0x0000000000FF0000-0x0000000001687000-memory.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
220-0-0x0000000000FF0000-0x0000000001687000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
220-0-0x0000000000FF0000-0x0000000001687000-memory.exe
-
Size
6.6MB
-
MD5
b16df2001c7408b5458550726efc23f5
-
SHA1
a95b94d4f4cb48b203afff35fba707a799b1a5ea
-
SHA256
5e9b5aefa8252c0d7c3ef2a286a1aa096e7fd8f391f18722e0edee7a40e086c8
-
SHA512
1b565414233f61bd47bec87f0ad04d129eb92df288c006260e5c4b1d05225596cbe35ed8e36bd540a8aca37bac9630f808197ecad9599e1232585dae14825380
-
SSDEEP
3072:NJAnWsN98GJkh1V0GzTfQ2u2FE/xZoOJ1gbIrWnXbxdUhViv+Q98Xwh:3Ab9HJGnzrQTZoO7gZXbxdiMvzqO
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1876 1888 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 220-0-0x0000000000FF0000-0x0000000001687000-memory.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1876 1888 220-0-0x0000000000FF0000-0x0000000001687000-memory.exe 30 PID 1888 wrote to memory of 1876 1888 220-0-0x0000000000FF0000-0x0000000001687000-memory.exe 30 PID 1888 wrote to memory of 1876 1888 220-0-0x0000000000FF0000-0x0000000001687000-memory.exe 30 PID 1888 wrote to memory of 1876 1888 220-0-0x0000000000FF0000-0x0000000001687000-memory.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\220-0-0x0000000000FF0000-0x0000000001687000-memory.exe"C:\Users\Admin\AppData\Local\Temp\220-0-0x0000000000FF0000-0x0000000001687000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 362⤵
- Program crash
PID:1876
-