Analysis
-
max time kernel
1719s -
max time network
1174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
31-12-2023 15:29
Static task
static1
Behavioral task
behavioral1
Sample
virus.txt
Resource
win10v2004-20231215-es
windows10-2004-x64
2 signatures
1800 seconds
General
-
Target
virus.txt
-
Size
62B
-
MD5
f32439cb651855ccd498f549e69d41fd
-
SHA1
05cf7cecf45cf0cb7957f0466ee19ffd3986318e
-
SHA256
88937cd3d32a7965ea58b80d98d79e0f08d490713d481ffffb65c7c046ba0772
-
SHA512
58f5fd73fdceb93d8dddba1c353cc01c97b2e2b1c6877e4d057092d938515689892ed6541d4a3418981db07f82d80c1c5cbabe08787ed567fe97561c35d50647
Score
1/10
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4244 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3600 svchost.exe
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\virus.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4244
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3600