Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
51d7b870df6697c1a26bca18947efa73.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
51d7b870df6697c1a26bca18947efa73.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
51d7b870df6697c1a26bca18947efa73.exe
-
Size
182KB
-
MD5
51d7b870df6697c1a26bca18947efa73
-
SHA1
76080ab248093ff8269804ce3e294f3fd3d1a2e1
-
SHA256
f46aff2990cbd65550c7460fb315ab8e328ea997eabe7b826eac9c4279960c69
-
SHA512
0f3e50613a1a082095b4fc43eeabb34585ff752e705c52f9d0678389f5eef3a2bae9c7d9f0bf80bce252b992983b14d1103b677c93ec5120637a0cab5deb3b3f
-
SSDEEP
3072:TER5Ah6S8S1m2YPrh4qR8vCZksB+Sddqol2lQBV+UdE+rECWp7hKIghM20n:TEXAEl6QPzksB+EYgBV+UdvrEFp7hKIH
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 1992 51d7b870df6697c1a26bca18947efa73.exe -
resource yara_rule behavioral1/memory/1992-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/1992-6-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 51d7b870df6697c1a26bca18947efa73.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 51d7b870df6697c1a26bca18947efa73.exe