Analysis
-
max time kernel
120s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0c83cec42254d496d9f1ae3a3792f3e5.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c83cec42254d496d9f1ae3a3792f3e5.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
0c83cec42254d496d9f1ae3a3792f3e5.exe
-
Size
9KB
-
MD5
0c83cec42254d496d9f1ae3a3792f3e5
-
SHA1
7e5e265ad6f82974e640b6daa727c46f46f595b6
-
SHA256
9c6f7b61df874d5cbcbdd867474cdcff987091e87326144ebcfe4c124e5cbe80
-
SHA512
40ac15245f3178caf73edf053a5bdc11538be2c3839aa2326e193c82f350bb5d5d004b3b1935ab4b8da7cee69732b98404df127610f678979b56dd23bd1d1a59
-
SSDEEP
192:fBksuXrN3y+tjeMZZ3m93VnjdwCz3321U495Pj:YZ3jeMKFnhwCToVzP
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 0c83cec42254d496d9f1ae3a3792f3e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2744 1364 0c83cec42254d496d9f1ae3a3792f3e5.exe 30 PID 1364 wrote to memory of 2744 1364 0c83cec42254d496d9f1ae3a3792f3e5.exe 30 PID 1364 wrote to memory of 2744 1364 0c83cec42254d496d9f1ae3a3792f3e5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c83cec42254d496d9f1ae3a3792f3e5.exe"C:\Users\Admin\AppData\Local\Temp\0c83cec42254d496d9f1ae3a3792f3e5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1364 -s 9002⤵PID:2744
-