Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 10:25
Behavioral task
behavioral1
Sample
2852-32-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win7-20231020-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
2852-32-0x0000000000400000-0x0000000000442000-memory.exe
Resource
win10v2004-20231130-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2852-32-0x0000000000400000-0x0000000000442000-memory.exe
-
Size
264KB
-
MD5
3b35f03d3fdd75f08d3965933c29ab6a
-
SHA1
d47949f076bac4dff6279b98290e55c425e4d497
-
SHA256
24cfe3da55b5aef8cf6110312b4a5ceed4b2fcee09eb00019ba311b8dfa75580
-
SHA512
1ff6de86b7e3238a991a9464b6f4f9ccc62861a561c52b068332cdcb369d378771023f4ab2c5acc2248d350b835f38481acfff680014f0365529034e5f39efbf
-
SSDEEP
3072:poymieCUvaThwbV9H4Pwfivt6p5NMZLJI:poymieCUvaThwbV9Tqvt6aZl
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2036 888 WerFault.exe 86 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3736 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2852-32-0x0000000000400000-0x0000000000442000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2852-32-0x0000000000400000-0x0000000000442000-memory.exe"1⤵PID:888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 2002⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 888 -ip 8881⤵PID:1476
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3736