Analysis
-
max time kernel
106s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 09:11
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
malw2.exe
Resource
win7-20250207-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
malw2.exe
Resource
win10v2004-20250314-en
5 signatures
150 seconds
General
-
Target
malw2.exe
-
Size
971KB
-
MD5
ab68dae6f5d3b199136a3afe25582ec1
-
SHA1
f11af09eaed02727ff969d2459092096d80b47ea
-
SHA256
20eecce76fb0a55470277953da23afee3d6c9cc2e4d09e1b9c79e3ac52dae00c
-
SHA512
6f012d70bc9c4ac5d4518082ef23a104111a3e043c0a03f7a10180198e9c5425b7463cb337f8c337e06ad86d0e30bbf73a710ba6f821aa67d818b5b78fbc2e79
-
SSDEEP
24576:eu6J33O0c+JY5UZ+XC0kGso6Fao04y2WY:wu0c++OCvkGs9Fao0RY
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5336 4488 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language malw2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4488 malw2.exe 4488 malw2.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4488 malw2.exe 4488 malw2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3880 4488 malw2.exe 89 PID 4488 wrote to memory of 3880 4488 malw2.exe 89 PID 4488 wrote to memory of 3880 4488 malw2.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\malw2.exe"C:\Users\Admin\AppData\Local\Temp\malw2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\malw2.exe"2⤵PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 6922⤵
- Program crash
PID:5336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:4732