Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0f544aa17d9f441ce6d129626ce5c67e.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0f544aa17d9f441ce6d129626ce5c67e.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
0f544aa17d9f441ce6d129626ce5c67e.exe
-
Size
9KB
-
MD5
0f544aa17d9f441ce6d129626ce5c67e
-
SHA1
6edcf65b3637c611671431f9ad39c9ef232de86a
-
SHA256
e85f5100be43921722cd80735afc7be936b44b083dea59ffc3d44b2ca51570fe
-
SHA512
648df5c2a72d416b63bf02bb5a234f3b7854eef6e0ed79a17fa1907fdcd08c171088ec153b33dbc487d45b768e1110d7f90848a32a919f4f10a0d0c6d7edff9d
-
SSDEEP
192:0Bksuz9MuInDeMZZ3D93VnjdwqzN3/RdrT:Zl6DeMtFnhwqRvbr
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 0f544aa17d9f441ce6d129626ce5c67e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2968 1712 0f544aa17d9f441ce6d129626ce5c67e.exe 28 PID 1712 wrote to memory of 2968 1712 0f544aa17d9f441ce6d129626ce5c67e.exe 28 PID 1712 wrote to memory of 2968 1712 0f544aa17d9f441ce6d129626ce5c67e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f544aa17d9f441ce6d129626ce5c67e.exe"C:\Users\Admin\AppData\Local\Temp\0f544aa17d9f441ce6d129626ce5c67e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1712 -s 9002⤵PID:2968
-