Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01cc2ecdd58f42c990762add7840b136.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
01cc2ecdd58f42c990762add7840b136.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
01cc2ecdd58f42c990762add7840b136.exe
-
Size
9KB
-
MD5
01cc2ecdd58f42c990762add7840b136
-
SHA1
17417e487d92c853cc0d417993ee1b14b26c58ca
-
SHA256
3c718ea531a45fbf443d687afaff16ca75a4f93031335004042ca8b8ff49088c
-
SHA512
594030dc67208e39a789601c34ca779a199b9830ac3d9c58644ea3585ff9efc6cf6fca42dcaab76b10f0b02e84a47daa618130e3ce3ee07fad4f61f7ae293590
-
SSDEEP
192:P32tbH6kdiUD3eUMwlgaoZZRDTbKEJ+6Syp:PGZak7ThPgaoZZ9TbKt6h
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1464 2032 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 01cc2ecdd58f42c990762add7840b136.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1464 2032 01cc2ecdd58f42c990762add7840b136.exe 29 PID 2032 wrote to memory of 1464 2032 01cc2ecdd58f42c990762add7840b136.exe 29 PID 2032 wrote to memory of 1464 2032 01cc2ecdd58f42c990762add7840b136.exe 29 PID 2032 wrote to memory of 1464 2032 01cc2ecdd58f42c990762add7840b136.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\01cc2ecdd58f42c990762add7840b136.exe"C:\Users\Admin\AppData\Local\Temp\01cc2ecdd58f42c990762add7840b136.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 5802⤵
- Program crash
PID:1464
-