Analysis
-
max time kernel
38s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
1af0e12fc38a64654bce554612545b34.exe
Resource
win7-20241010-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1af0e12fc38a64654bce554612545b34.exe
-
Size
1004KB
-
MD5
1af0e12fc38a64654bce554612545b34
-
SHA1
2704339f5dc0a824b08b978ccf324cc99231b406
-
SHA256
79b8594b53a0516453df5007270848fc2018f630b7f4f88feb4beacd420ed83a
-
SHA512
fb5ff981722253b73549db4d306f02ca21649455b9260a781cb0c2b24164e72bf4cdf24a140fd3dcaad5b21e32a84b49cb3ec558e2d6ab7253f4cb63e91a9ca3
-
SSDEEP
24576:io23milEV1TtrBxLdx+WjQw8cSh638FF3HEh/LEVbfGf:W2RrBfxzMh6sFtkh/LEbfGf
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\brokerutil.vbs 1af0e12fc38a64654bce554612545b34.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6408 2580 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1af0e12fc38a64654bce554612545b34.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2580 1af0e12fc38a64654bce554612545b34.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 1af0e12fc38a64654bce554612545b34.exe Token: SeDebugPrivilege 2580 1af0e12fc38a64654bce554612545b34.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 6408 2580 1af0e12fc38a64654bce554612545b34.exe 29 PID 2580 wrote to memory of 6408 2580 1af0e12fc38a64654bce554612545b34.exe 29 PID 2580 wrote to memory of 6408 2580 1af0e12fc38a64654bce554612545b34.exe 29 PID 2580 wrote to memory of 6408 2580 1af0e12fc38a64654bce554612545b34.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af0e12fc38a64654bce554612545b34.exe"C:\Users\Admin\AppData\Local\Temp\1af0e12fc38a64654bce554612545b34.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 6362⤵
- Program crash
PID:6408
-