Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 16:24

General

  • Target

    3932-0-0x00000000004A0000-0x0000000000B3F000-memory.exe

  • Size

    6.6MB

  • MD5

    15015c050af15793acd1363d064474f4

  • SHA1

    97f4c35f1ca66fbcf9dacc65083b21bc8d9fd79b

  • SHA256

    9ae97732eb6c74b0adfd669df4369024ebcee3729454b646c638b0b4ca3aa614

  • SHA512

    0578747615afcbad66d6ded9f616af6d1a981d3f659d822a5f6bb69c912f7bf33f41ba16083422f8ff38d888a9d1248180f0191cd9919d6c4c539aa15d4975a0

  • SSDEEP

    3072:z+JxUbA9eXtkfyWpfn5KFCfcXuNumHL+EjJ8cRrx0I2v+Q98Xsp:oyAetkLKFCkXwumr+cJTrxCvzqa

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3932-0-0x00000000004A0000-0x0000000000B3F000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\3932-0-0x00000000004A0000-0x0000000000B3F000-memory.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 232
      2⤵
      • Program crash
      PID:1420
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4172 -ip 4172
    1⤵
      PID:2052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4172-0-0x0000000000030000-0x00000000006CF000-memory.dmp

      Filesize

      6.6MB