Analysis

  • max time kernel
    103s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2025, 13:48

General

  • Target

    virusshare/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe

  • Size

    2.9MB

  • MD5

    1ad9a67240d5775395c45b64dd6529fa

  • SHA1

    c653d2c475f639ad68c210e0f9d829344c5663c7

  • SHA256

    3751298058a2a5d0912caa35bfdbafa48ae788647b536e69ad383c7c1990dd9d

  • SHA512

    721b1c577db1cfe5465eaceadf2a7cc9d3f68d341f98d7dcc4bde2ff606f359b6bc917e993f5f05e9897b7957ca2617fa03937c2aea6a8462b86f2e750397c23

  • SSDEEP

    49152:4obi85jFGg0IZHVA/pfa8u0Ikjhd6kss8CYxB52ibDIJZKpYg0Kg9e+KgFTRFO:Vzh6/I8u0IktgkOvxBUibs2Z0ggFdE

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\virusshare\2\VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
    "C:\Users\Admin\AppData\Local\Temp\virusshare\2\VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 388
      2⤵
      • Program crash
      PID:2024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 400
      2⤵
      • Program crash
      PID:4540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4220 -ip 4220
    1⤵
      PID:5092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4220 -ip 4220
      1⤵
        PID:5208

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4220-0-0x0000000002200000-0x000000000246A000-memory.dmp

        Filesize

        2.4MB

      • memory/4220-1-0x0000000002470000-0x00000000026D7000-memory.dmp

        Filesize

        2.4MB

      • memory/4220-3-0x00000000026E0000-0x0000000002949000-memory.dmp

        Filesize

        2.4MB

      • memory/4220-8-0x00000000026E0000-0x0000000002949000-memory.dmp

        Filesize

        2.4MB

      • memory/4220-15-0x0000000002A50000-0x0000000002CA7000-memory.dmp

        Filesize

        2.3MB

      • memory/4220-16-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/4220-17-0x0000000002470000-0x00000000026D7000-memory.dmp

        Filesize

        2.4MB

      • memory/4220-18-0x00000000026E0000-0x0000000002949000-memory.dmp

        Filesize

        2.4MB