Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 11:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bothb4762.exe
Resource
win7-20241023-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
bothb4762.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
bothb4762.exe
-
Size
291KB
-
MD5
e40716ec136991058a86358953c71a27
-
SHA1
08401ceead3c6cbd5e4d187b29b6fdf9725cf63d
-
SHA256
f1e8731c7e1849989749c9ff23497e310025a9536fea8d25ccab050db2fffe33
-
SHA512
a6cd0a9194da99a1dedbc1d99b0bd600a055aa1b9478a1d7831ab88e64dd0216b11eef0d24c128bcd77d0e68273fb961f1ff8ff230056379ca48108a64d25b11
-
SSDEEP
6144:MfAn+VymyRH+jffLf+4J+8IiTA7PmgtZrZ+XWlu:MfAOBYejffLRw8IjjrYGE
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1188 4248 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bothb4762.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 860 4248 bothb4762.exe 85 PID 4248 wrote to memory of 860 4248 bothb4762.exe 85 PID 4248 wrote to memory of 860 4248 bothb4762.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"C:\Users\Admin\AppData\Local\Temp\bothb4762.exe"2⤵PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 4522⤵
- Program crash
PID:1188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4248 -ip 42481⤵PID:4144