Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 06:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
zamówienia 24032025DJ ZK.scr
Resource
win7-20240729-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
zamówienia 24032025DJ ZK.scr
Resource
win10v2004-20250314-en
12 signatures
150 seconds
General
-
Target
zamówienia 24032025DJ ZK.scr
-
Size
90KB
-
MD5
ef47c8ffb32fbb6af60521f3854f3d19
-
SHA1
02b72518f179067604e062ef7550c08dbad056ce
-
SHA256
a56b8d0dbdca88fea0f47a26d379ee447062138e325d782aa6b2618c8deae166
-
SHA512
034eb6ad01112ae9535439f1fb68ef0601338e33bffaa50389b32d388685da3bc3c6a6c20072a1dc805541a5c2ca2c3a6dd508f9e861439283b52dc72ee42293
-
SSDEEP
384:pin46OHULG1fn20klvaO222fXfXfXVjJPDPDPHPHPZqc:piYF1P2/aD
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4644 2340 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zamówienia 24032025DJ ZK.scr -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2340 zamówienia 24032025DJ ZK.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2340 zamówienia 24032025DJ ZK.scr Token: SeDebugPrivilege 2340 zamówienia 24032025DJ ZK.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4644 2340 zamówienia 24032025DJ ZK.scr 31 PID 2340 wrote to memory of 4644 2340 zamówienia 24032025DJ ZK.scr 31 PID 2340 wrote to memory of 4644 2340 zamówienia 24032025DJ ZK.scr 31 PID 2340 wrote to memory of 4644 2340 zamówienia 24032025DJ ZK.scr 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\zamówienia 24032025DJ ZK.scr"C:\Users\Admin\AppData\Local\Temp\zamówienia 24032025DJ ZK.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 10522⤵
- Program crash
PID:4644
-