Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 21:38

General

  • Target

    2320-0-0x00000000006A0000-0x0000000000D36000-memory.exe

  • Size

    6.6MB

  • MD5

    89ca183e02a40d79a571f8290315527c

  • SHA1

    6e72d8cb6e01eb4d6d73d5445e27150716a0e2a3

  • SHA256

    5daf2311bba95a61c68c8e33e11f3a8bcdab592966db55b4892b54b3d5d878cc

  • SHA512

    f884eff79455ca2d01e77bf8536e17822f513d6bc017dad8cedee95b5422655f5049e9295e12161b0a5df6e3201203f49f0612391b0781af82caec6448ea8d2c

  • SSDEEP

    3072:OENcWKVPMokeDRguXqHZXl8/m10Nded6/Wyrmz3UBL0fOv+Q98XkV:GlVPLDRguX2z10Ncd6PqTGLfvzqW

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2320-0-0x00000000006A0000-0x0000000000D36000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\2320-0-0x00000000006A0000-0x0000000000D36000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 224
      2⤵
      • Program crash
      PID:952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3172 -ip 3172
    1⤵
      PID:3480

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3172-0-0x0000000000BC0000-0x0000000001256000-memory.dmp

      Filesize

      6.6MB