Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2627f2902ab033ea3895e8c427c82f26.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2627f2902ab033ea3895e8c427c82f26.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
2627f2902ab033ea3895e8c427c82f26.exe
-
Size
9KB
-
MD5
2627f2902ab033ea3895e8c427c82f26
-
SHA1
3977ec60c87e306ef621ae01e6db7c762265f78a
-
SHA256
b5b742e349988441a7207878c3f557ab954bbbd873a0b71348c17d41b64ae7a0
-
SHA512
ea45c67c8605ef760d22d9c5b0c028b2dbe63e17d4d53ee2e48a423c79cdf30611a7e62ef0866dbe51232cfc658a86d3d6db789018ef5915ddb6b04db7ac99f8
-
SSDEEP
192:WBksujPY82gQv5F40tzeMZZ3E93VnjdwCzp346FuIF7:+82l40tzeMoFnhwCtVFdF
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1444 2627f2902ab033ea3895e8c427c82f26.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2940 1444 2627f2902ab033ea3895e8c427c82f26.exe 28 PID 1444 wrote to memory of 2940 1444 2627f2902ab033ea3895e8c427c82f26.exe 28 PID 1444 wrote to memory of 2940 1444 2627f2902ab033ea3895e8c427c82f26.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2627f2902ab033ea3895e8c427c82f26.exe"C:\Users\Admin\AppData\Local\Temp\2627f2902ab033ea3895e8c427c82f26.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1444 -s 8962⤵PID:2940
-