Analysis
-
max time kernel
57s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 16:28
Behavioral task
behavioral1
Sample
696969.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
696969.exe
Resource
win10v2004-20241007-en
General
-
Target
696969.exe
-
Size
240KB
-
MD5
89ad45b4a0e2d547c1e09d0a1ea94df6
-
SHA1
ca32c2e492bb6d0753aab59993380db79b080740
-
SHA256
18f4e82898557ba7f23f5b58e181793aee6b9ee066258ce0b8fdba63a714c4f8
-
SHA512
22c575d47780046d845e0c383bf02aded47d2813173ea6f07180f8726be42084336ef5009c34c5c8295d0deddb3f19f6e5fee1902d62ac9499a117e7de59c4ff
-
SSDEEP
3072:skv0eu6ZJlctXwLISyqlsxfKPkAck1gD1l567pGDUJ42pUvp85lmv6RReHeP3Kqc:/MeNRFLIu5ckeHgFGD+jpUvwzzeot+
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2740 2268 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 696969.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 696969.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 696969.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2268 696969.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2740 2268 696969.exe 30 PID 2268 wrote to memory of 2740 2268 696969.exe 30 PID 2268 wrote to memory of 2740 2268 696969.exe 30 PID 2268 wrote to memory of 2740 2268 696969.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\696969.exe"C:\Users\Admin\AppData\Local\Temp\696969.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 2562⤵
- Program crash
PID:2740
-