Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 18:04
Behavioral task
behavioral1
Sample
3588-0-0x0000000000890000-0x0000000000F39000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3588-0-0x0000000000890000-0x0000000000F39000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3588-0-0x0000000000890000-0x0000000000F39000-memory.exe
-
Size
6.7MB
-
MD5
c20f5055e7b8051f259b6fda9c0aaaf0
-
SHA1
c622b9837dd2c083f788647f23bf0c59e5a4454a
-
SHA256
279f9e4a4c3016659b33e94c81b3d292bffee69109c884b0c64debce887c721f
-
SHA512
ac88bcdb855fda5278b37c63e3cc0857bcfee2a04d77c35e18c434d7a219de18145d1292766fbd3edfcfe355704042b9b0e775318e111345099af8294510f721
-
SSDEEP
3072:rBazaHnJ8YlyLJo6awhqGBnKEaviiP7gloUBmYQXY1cv+Q98XOe+:bHJ5lT6aA8viizmLUYcnvzq9+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2064 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3588-0-0x0000000000890000-0x0000000000F39000-memory.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2580 2064 3588-0-0x0000000000890000-0x0000000000F39000-memory.exe 30 PID 2064 wrote to memory of 2580 2064 3588-0-0x0000000000890000-0x0000000000F39000-memory.exe 30 PID 2064 wrote to memory of 2580 2064 3588-0-0x0000000000890000-0x0000000000F39000-memory.exe 30 PID 2064 wrote to memory of 2580 2064 3588-0-0x0000000000890000-0x0000000000F39000-memory.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3588-0-0x0000000000890000-0x0000000000F39000-memory.exe"C:\Users\Admin\AppData\Local\Temp\3588-0-0x0000000000890000-0x0000000000F39000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 362⤵
- Program crash
PID:2580
-