Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 04:12
Static task
static1
Behavioral task
behavioral1
Sample
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe
-
Size
503KB
-
MD5
8479e460fc8a0284d9af6e699a07e2c4
-
SHA1
bd6a2177d050c97afe50dfb53c50f5103c875939
-
SHA256
210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d
-
SHA512
5f41fecf65f6b36edfa285b0fd3c9ccd2e08f2520ce35d5aa14dfe2e67ffd6fabb9e776130bd4362ffe3bbb22b986614f536813e06eda9c2298bfd0b80dd531d
-
SSDEEP
12288:akN2r7eiIWbEnBnX/3PDxfw1pRlBB3mLDyyghJ:akN2veieX//D0j3OD5mJ
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 -
Program crash 2 IoCs
pid pid_target Process procid_target 1552 1404 WerFault.exe 31 2228 2280 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 1404 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 31 PID 2280 wrote to memory of 2228 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 32 PID 2280 wrote to memory of 2228 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 32 PID 2280 wrote to memory of 2228 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 32 PID 2280 wrote to memory of 2228 2280 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 32 PID 1404 wrote to memory of 1552 1404 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 33 PID 1404 wrote to memory of 1552 1404 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 33 PID 1404 wrote to memory of 1552 1404 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 33 PID 1404 wrote to memory of 1552 1404 210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"C:\Users\Admin\AppData\Local\Temp\210c6633c42bd185d92ad882a8cd836e9a266c672e4409b2edb74453fa96b60d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 1483⤵
- Program crash
PID:1552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 5202⤵
- Program crash
PID:2228
-