Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 20:19
Static task
static1
Behavioral task
behavioral1
Sample
HACKMS~1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HACKMS~1.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
media.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
media.exe
Resource
win10v2004-20250129-en
General
-
Target
HACKMS~1.exe
-
Size
712KB
-
MD5
b0dd4bc52eb381a7990558aac569b64f
-
SHA1
e8b81828b34d56de409d6cd3433baa7f38b5be78
-
SHA256
6194da0d241a12d32e7334d0aa8a2b253a6e80e882d67842279b7a4160faa59a
-
SHA512
f97c962965c2dfab030703a38c130438ec600011fb7ecf91732806a99f8e9d44e1e023bbd372aa0829a2a03b7efb20ccd788fbbeaddda27c995c48e0e9566a90
-
SSDEEP
12288:4H2jynD0FV3hOrW2jynD0FV3XpDXeGxEiPvc5FJneuDlhza0FOjynk36ni:4H2ODPW2ODypDXeGxEiPvc54rOk3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2336 2032 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HACKMS~1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2336 2032 HACKMS~1.exe 31 PID 2032 wrote to memory of 2336 2032 HACKMS~1.exe 31 PID 2032 wrote to memory of 2336 2032 HACKMS~1.exe 31 PID 2032 wrote to memory of 2336 2032 HACKMS~1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\HACKMS~1.exe"C:\Users\Admin\AppData\Local\Temp\HACKMS~1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1482⤵
- Program crash
PID:2336
-