Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-01-2024 00:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e4dffb3db050f2787b7ff6f0327e134.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e4dffb3db050f2787b7ff6f0327e134.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3e4dffb3db050f2787b7ff6f0327e134.exe
-
Size
9KB
-
MD5
3e4dffb3db050f2787b7ff6f0327e134
-
SHA1
5a2a0eb7fcf849053e00833b9320450a4f7696ec
-
SHA256
98dae10ace8c85fb4778aebf9a2ece4d12c1f31988b068ca314c3905efe1741e
-
SHA512
86b22663841d0d949b6170d90cd4b08f6cefd82e34bc9fa5328aa7bb872dcb8cae1995162ff4ccb47f7272159a52788497e69f2591c40b59bc694ff5ea80716f
-
SSDEEP
192:lBksuDEXVwV3HueMZZ3P93VnjdwCzF3pQQceX4:PVwRueMhFnhwCB5G4
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 3e4dffb3db050f2787b7ff6f0327e134.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2240 2616 3e4dffb3db050f2787b7ff6f0327e134.exe 29 PID 2616 wrote to memory of 2240 2616 3e4dffb3db050f2787b7ff6f0327e134.exe 29 PID 2616 wrote to memory of 2240 2616 3e4dffb3db050f2787b7ff6f0327e134.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4dffb3db050f2787b7ff6f0327e134.exe"C:\Users\Admin\AppData\Local\Temp\3e4dffb3db050f2787b7ff6f0327e134.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2616 -s 9042⤵PID:2240
-