Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe
Resource
win10v2004-20250217-en
General
-
Target
0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe
-
Size
1.3MB
-
MD5
b45fdcd6c8fa31e0adf5f4f91c052c39
-
SHA1
63a58e43ee53a0a2dfd04306cc3298f84a7be60b
-
SHA256
0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f
-
SHA512
21dffa4dfbcdf64abc3ab9f14db8a174505f4fe9c3d47dfe4a1eac55bac68f9ec59f68dfa6d5a3e9d2958c5cfc9dc8bf06e4aa30abde49655693f91f725216eb
-
SSDEEP
24576:SV5dPaGXy3pto7WqBtRpcG9tDmBNf3fxY1pORoSfg9i+2FjC:ElyZtoSqlpHLmXf32vORoSo9i+2
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Current.vbs 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4596 1872 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe Token: SeDebugPrivilege 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 4596 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe 31 PID 1872 wrote to memory of 4596 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe 31 PID 1872 wrote to memory of 4596 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe 31 PID 1872 wrote to memory of 4596 1872 0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe"C:\Users\Admin\AppData\Local\Temp\0b56d8b3ffd39f5ee4a0af61b329700051e38c019a722e74efc197b18602f69f.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 7322⤵
- Program crash
PID:4596
-