Analysis

  • max time kernel
    101s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 15:46

General

  • Target

    164137e9c7a5096e5aa479faf3d53dde1bb25fa811afd4d3476d01d95be50e54.exe

  • Size

    382KB

  • MD5

    4abde9a6c0e63e8b6688e4e90103d015

  • SHA1

    20f8380026eb57f94568f3fc7610a7076f433681

  • SHA256

    164137e9c7a5096e5aa479faf3d53dde1bb25fa811afd4d3476d01d95be50e54

  • SHA512

    3adc3ba7e82ab57fd332f80674376c9ef9ba12d1d2d21da5fdee8bf8ec4d93de1bd38962dad357db24c85f33f1a4054896cd196894a8323a101242161c2f0c1f

  • SSDEEP

    3072:4k59fo2r2f0oJDib8iLws7ngPDwGj9Tf8mrxWxfaDAHVyQ0Po3:4k7o2r2fj2P8sbg8Gj9om1WySVyQ0A3

Score
5/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\164137e9c7a5096e5aa479faf3d53dde1bb25fa811afd4d3476d01d95be50e54.exe
    "C:\Users\Admin\AppData\Local\Temp\164137e9c7a5096e5aa479faf3d53dde1bb25fa811afd4d3476d01d95be50e54.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3252
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 264
      2⤵
      • Program crash
      PID:2040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3252 -ip 3252
    1⤵
      PID:1932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3252-0-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB

    • memory/3252-1-0x00000000021C0000-0x00000000021C1000-memory.dmp

      Filesize

      4KB

    • memory/3252-2-0x0000000000400000-0x0000000000485000-memory.dmp

      Filesize

      532KB