Analysis
-
max time kernel
92s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 22:53
Behavioral task
behavioral1
Sample
2532-3-0x0000000001390000-0x0000000001A26000-memory.exe
Resource
win7-20240903-en
windows7-x64
0 signatures
150 seconds
General
-
Target
2532-3-0x0000000001390000-0x0000000001A26000-memory.exe
-
Size
6.6MB
-
MD5
95fbb042426249b2e3d0a727741b0dd7
-
SHA1
432ef226e169cd4a53b0baa282f69c2c134d1a98
-
SHA256
3f0eee0e656c8277ffb757baa5c8c685d91dd75e9787f9a09cb4ee35972d6f59
-
SHA512
601fdaa38945592524964064e23debed8a6872d46232808a0339cc2e994f75768251ebf90bb976f904ccbac389dba005be3606567cb61bd68196c2c56ee495d3
-
SSDEEP
49152:vbHVS815Ohommy6W4hESbj8STBe2yvjlGGnnFEDtp4xrpcJdXhv22mDiEo:D4815OKmmy6Wm8SVhy5gt6ruJdXhuW
Malware Config
Signatures
-
Stealc family
-
Program crash 1 IoCs
pid pid_target Process procid_target 4956 1896 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2532-3-0x0000000001390000-0x0000000001A26000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2532-3-0x0000000001390000-0x0000000001A26000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2532-3-0x0000000001390000-0x0000000001A26000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 2162⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1896 -ip 18961⤵PID:1984