Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 00:01
Behavioral task
behavioral1
Sample
513205267c3ee1a6f6bfeb60fcf0bdf53bdb82f3c642c71c5519cc508b6753a3.exe
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
513205267c3ee1a6f6bfeb60fcf0bdf53bdb82f3c642c71c5519cc508b6753a3.exe
-
Size
2.2MB
-
MD5
50e2037b537da630b958ff3a9961c759
-
SHA1
b7b325e661c2a74969ccd7112721340451976d90
-
SHA256
513205267c3ee1a6f6bfeb60fcf0bdf53bdb82f3c642c71c5519cc508b6753a3
-
SHA512
d7416df3193a401edfae6e6ef44807f46c3e4517e454a4ce9a108d09f13d41086025d2a6629d44ed29ea7ee839adf3c15e77a58baa74269cb90a7d0e7abfbb06
-
SSDEEP
3072:uD57MfoQ5nUjcMdN4AQiU9UpTypXcrGJ:uD54fjx7Wxh0UpuBgA
Malware Config
Signatures
-
Stealc family
-
Program crash 1 IoCs
pid pid_target Process procid_target 1732 3420 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 513205267c3ee1a6f6bfeb60fcf0bdf53bdb82f3c642c71c5519cc508b6753a3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\513205267c3ee1a6f6bfeb60fcf0bdf53bdb82f3c642c71c5519cc508b6753a3.exe"C:\Users\Admin\AppData\Local\Temp\513205267c3ee1a6f6bfeb60fcf0bdf53bdb82f3c642c71c5519cc508b6753a3.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 2162⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3420 -ip 34201⤵PID:1368