Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 11:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
16c23beea2ed64892ae33e3214dcd22e.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
16c23beea2ed64892ae33e3214dcd22e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
16c23beea2ed64892ae33e3214dcd22e.exe
-
Size
22KB
-
MD5
16c23beea2ed64892ae33e3214dcd22e
-
SHA1
dc3a74fb3723160a2b80fd7adb6cc006b84f3c04
-
SHA256
0821ca98c306c5ac791e7fb80d81e5f8dc7d49f3bd88935561c1bc0d70821674
-
SHA512
cda51458e2f038ed8e03af4dad324866428f439b086ba7d5bd6f843d6d0aa91fa5294ccde00d7bbd331c5242ffec5bdf8f5b17c0594bbe4bcd3e0378145ff8dd
-
SSDEEP
384:I9azLT4M+GdozOWeLYRJkE6SesUynJ8Y/TISQk:IDM+GdozOWeLYR+EJPqYrz
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
16c23beea2ed64892ae33e3214dcd22e.exedescription pid Process Token: SeDebugPrivilege 2364 16c23beea2ed64892ae33e3214dcd22e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
16c23beea2ed64892ae33e3214dcd22e.exedescription pid Process procid_target PID 2364 wrote to memory of 2400 2364 16c23beea2ed64892ae33e3214dcd22e.exe 28 PID 2364 wrote to memory of 2400 2364 16c23beea2ed64892ae33e3214dcd22e.exe 28 PID 2364 wrote to memory of 2400 2364 16c23beea2ed64892ae33e3214dcd22e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c23beea2ed64892ae33e3214dcd22e.exe"C:\Users\Admin\AppData\Local\Temp\16c23beea2ed64892ae33e3214dcd22e.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2364 -s 10642⤵PID:2400
-