Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 22:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
413b16d130b62e3b82effc689d6de22b.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
413b16d130b62e3b82effc689d6de22b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
413b16d130b62e3b82effc689d6de22b.exe
-
Size
9KB
-
MD5
413b16d130b62e3b82effc689d6de22b
-
SHA1
2fb1bb94689f026f01c26ef0860caeb06c49a474
-
SHA256
a0543707fca6806db9188ebcf7414b4998c4cad2589f731344bd4afa8d0c6ad4
-
SHA512
2deee9c4c1e677453a92087551160ad2c6237e40d8a1f3a611dbc5d10fbba60cd8883e23d2dd72df5deaf85f6a0e4f39e41028223e1af830d36db656f67f2a0c
-
SSDEEP
192:4BksuXEXVwVIQeMZZ3t93VnjdwCzS3YpSV:YVwOQeM3FnhwCuoY
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3032 413b16d130b62e3b82effc689d6de22b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2672 3032 413b16d130b62e3b82effc689d6de22b.exe 28 PID 3032 wrote to memory of 2672 3032 413b16d130b62e3b82effc689d6de22b.exe 28 PID 3032 wrote to memory of 2672 3032 413b16d130b62e3b82effc689d6de22b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\413b16d130b62e3b82effc689d6de22b.exe"C:\Users\Admin\AppData\Local\Temp\413b16d130b62e3b82effc689d6de22b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3032 -s 9002⤵PID:2672
-