Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 21:12
Behavioral task
behavioral1
Sample
17363706679f66791e3cbbdf307ee238f196a6063e942755f8fc28f0b8569050ef98e8281a385.dat-decoded.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17363706679f66791e3cbbdf307ee238f196a6063e942755f8fc28f0b8569050ef98e8281a385.dat-decoded.exe
Resource
win10v2004-20241007-en
General
-
Target
17363706679f66791e3cbbdf307ee238f196a6063e942755f8fc28f0b8569050ef98e8281a385.dat-decoded.exe
-
Size
332KB
-
MD5
4d85799c044b617d8fa3b3bd91f75a41
-
SHA1
d75d4ba4ff2889e0a93b4f20ef2f1a990fa916d4
-
SHA256
be9d59c3d0d868387985f389c2992f9b4d51e16c37db194abc078b3034b0e7a8
-
SHA512
cb7c20a7dd3bd1ff739d92a51dd2c31dc03b4282a4db4880a5bc036fc2221767cbdda501fb6b11680fc9b3b03d77a6e5c18b9e0783f2ea9915c4a87f515e56e8
-
SSDEEP
6144:FmyyGBlJDGJoh+c1Klx5vDXAlFwmvFdvjT8LYyGiDoFh9YV:nBlJDGtxhAbwCvbT8EFN39
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 816 4868 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17363706679f66791e3cbbdf307ee238f196a6063e942755f8fc28f0b8569050ef98e8281a385.dat-decoded.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17363706679f66791e3cbbdf307ee238f196a6063e942755f8fc28f0b8569050ef98e8281a385.dat-decoded.exe"C:\Users\Admin\AppData\Local\Temp\17363706679f66791e3cbbdf307ee238f196a6063e942755f8fc28f0b8569050ef98e8281a385.dat-decoded.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 2242⤵
- Program crash
PID:816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4868 -ip 48681⤵PID:764