Analysis
-
max time kernel
87s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2023 00:34
Static task
static1
Behavioral task
behavioral1
Sample
5d649c5aa230376f1a08074aee91129b8031606856e9b4b6c6d0387f35f6629d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5d649c5aa230376f1a08074aee91129b8031606856e9b4b6c6d0387f35f6629d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
c846e7bbbc1f65452bdca87523edf0fd1a58cbd9a45e622e29d480d8d80ac331.exe
Resource
win10v2004-20220812-en
General
-
Target
a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe
-
Size
323.8MB
-
MD5
6315802a5c2570a5dc6460eaccc678a4
-
SHA1
3805588acfce5c1b0eeb5bd2e16a912208a77549
-
SHA256
f7a0c0519fc45fc498b46399982886633c79ba4c72d07fc9836cb5be2fb4685d
-
SHA512
05f379390a4ce1bab9799ae19f6d8cba862bb37eca8a6c98fae790342eb8ad626d79c63ad0c5c2e038f8368df7bc8a6fc1315b25c543651f2266bcfffe8a3cdd
-
SSDEEP
96:WAwa5N9p+ZNLDApFY1jAdhkxgqEQGnQUzNtd:WAwa5grL+OEyxgfFn/r
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4272 3172 WerFault.exe 79 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3172 a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe"C:\Users\Admin\AppData\Local\Temp\a7c006a79a6ded6b1cb39a71183123dcaaaa21ea2684a8f199f27e16fcb30e8e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 16962⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3172 -ip 31721⤵PID:3572