Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
04/11/2023, 03:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e84d471a80ec83eb8af3c140a6e4226b.exe
Resource
win7-20231023-en
4 signatures
150 seconds
General
-
Target
e84d471a80ec83eb8af3c140a6e4226b.exe
-
Size
10KB
-
MD5
e84d471a80ec83eb8af3c140a6e4226b
-
SHA1
0fa7ab7b987a21968e212fc6880a8a9221ea183c
-
SHA256
cb17971c69696d81a364f55879b02caae2bd0135d0d1d6bfba48868f7a2f1d30
-
SHA512
671afbdc9d7e5999a5dbc80436e74003282f2d1ca75bc6506c7b6c32bec0c9cd8e923e4641a3c4e43b1f406c50fd7adbf8ec56b7ebbad379618f4310da472b0a
-
SSDEEP
96:L5u1RonGBS0ivS1dbbDsYn6jMX9ps24tEkKa704yUtGSCOSWWC7pEm0/tfulFYzj:lu1dSebnsoqMXbsfHXyU5WC7pcWF6
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2888 1744 WerFault.exe 31 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1192 e84d471a80ec83eb8af3c140a6e4226b.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1192 wrote to memory of 1744 1192 e84d471a80ec83eb8af3c140a6e4226b.exe 31 PID 1744 wrote to memory of 2888 1744 e84d471a80ec83eb8af3c140a6e4226b.exe 32 PID 1744 wrote to memory of 2888 1744 e84d471a80ec83eb8af3c140a6e4226b.exe 32 PID 1744 wrote to memory of 2888 1744 e84d471a80ec83eb8af3c140a6e4226b.exe 32 PID 1744 wrote to memory of 2888 1744 e84d471a80ec83eb8af3c140a6e4226b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e84d471a80ec83eb8af3c140a6e4226b.exe"C:\Users\Admin\AppData\Local\Temp\e84d471a80ec83eb8af3c140a6e4226b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\e84d471a80ec83eb8af3c140a6e4226b.exeC:\Users\Admin\AppData\Local\Temp\e84d471a80ec83eb8af3c140a6e4226b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 1603⤵
- Program crash
PID:2888
-
-