Analysis
-
max time kernel
13s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 18:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
34e7ff4e91e7fe0a95d5dba92724847a.exe
Resource
win7-20231215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
34e7ff4e91e7fe0a95d5dba92724847a.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
34e7ff4e91e7fe0a95d5dba92724847a.exe
-
Size
1.8MB
-
MD5
34e7ff4e91e7fe0a95d5dba92724847a
-
SHA1
c626fe4891d256e2f7aaa5d177f3dfe950e89923
-
SHA256
5cf0b62e76db6b5908a7ceee65fb4e56e00e0b5eed382ee0930d6c373913c965
-
SHA512
eb3b749f0d7de30b7fc0e990b626f0388f24a1d2626fa9d954855b66cd5c489c43ca105e8b498810b79a1628b4967bd491990f986962ac4e2db2626642a0cfa6
-
SSDEEP
49152:Bpd323io5Ie1DasY6DwOBfrnvV7UeWtcI:Bpd323N5r9YiwOBpIeWF
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 3384 dw20.exe Token: SeBackupPrivilege 3384 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 816 wrote to memory of 3384 816 34e7ff4e91e7fe0a95d5dba92724847a.exe 95 PID 816 wrote to memory of 3384 816 34e7ff4e91e7fe0a95d5dba92724847a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\34e7ff4e91e7fe0a95d5dba92724847a.exe"C:\Users\Admin\AppData\Local\Temp\34e7ff4e91e7fe0a95d5dba92724847a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 11922⤵
- Suspicious use of AdjustPrivilegeToken
PID:3384
-