Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 00:44

General

  • Target

    quarantine/zY9sqWs.exe

  • Size

    361KB

  • MD5

    2bb133c52b30e2b6b3608fdc5e7d7a22

  • SHA1

    fcb19512b31d9ece1bbe637fe18f8caf257f0a00

  • SHA256

    b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

  • SHA512

    73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

  • SSDEEP

    6144:VVWjGnPOzNsZKlgzMCoIRZ7HNfbjaHFljM7/o1kc3Rx:VVWjHzNsZK+MCoIRZ7HNjjaXMLo1V3R

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\quarantine\zY9sqWs.exe
    "C:\Users\Admin\AppData\Local\Temp\quarantine\zY9sqWs.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 1040
      2⤵
      • Program crash
      PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads