Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
5ec04966ef8901ac13aa603645b3197d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ec04966ef8901ac13aa603645b3197d.exe
Resource
win10v2004-20241007-en
General
-
Target
5ec04966ef8901ac13aa603645b3197d.exe
-
Size
5.1MB
-
MD5
5ec04966ef8901ac13aa603645b3197d
-
SHA1
e5263e87abb62c10a7224b598ae905858c6000de
-
SHA256
49e58e5dd3be1cb7249207a329c465ae65fa3099148b4e4e279afd88bc4b1fe0
-
SHA512
0fb6c5fa4110a2abcc02d1f405b1cd7236778223b2865991baef05eeaf2314d7b57104fbd0bc0a5c263561e144434a654937b4c620c5960f83064fcf279b3d4d
-
SSDEEP
98304:8L1T/X3Xn/odDFr3urN2mPR1iGV1PxMNmXV7v:+vJrNNJgGV1Px+W9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2068 2664 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ec04966ef8901ac13aa603645b3197d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 5ec04966ef8901ac13aa603645b3197d.exe 2664 5ec04966ef8901ac13aa603645b3197d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2068 2664 5ec04966ef8901ac13aa603645b3197d.exe 31 PID 2664 wrote to memory of 2068 2664 5ec04966ef8901ac13aa603645b3197d.exe 31 PID 2664 wrote to memory of 2068 2664 5ec04966ef8901ac13aa603645b3197d.exe 31 PID 2664 wrote to memory of 2068 2664 5ec04966ef8901ac13aa603645b3197d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ec04966ef8901ac13aa603645b3197d.exe"C:\Users\Admin\AppData\Local\Temp\5ec04966ef8901ac13aa603645b3197d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2322⤵
- Program crash
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b3727466ec07a63846376921058eb8c2
SHA19d5bb92eb483453386ca6584156b1779b81d517a
SHA2567288b5649ac5a71591da2e3e2dc8b6297160ba662f81d343cd59f271baee743e
SHA512e49bc7f234bd9c3a9cf07a5b55c20b8a6297bec3882962ea7e314968f75dd5d0091398cedf2065eea8451d2ae4bfb554c7d32afc00e32475c62fe652c39c9227