Analysis
-
max time kernel
122s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-01-2024 16:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3e76bf1a6f5ed603dfd632041f144153.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3e76bf1a6f5ed603dfd632041f144153.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
3e76bf1a6f5ed603dfd632041f144153.exe
-
Size
9KB
-
MD5
3e76bf1a6f5ed603dfd632041f144153
-
SHA1
434f2393f58225c2cfa7888d1e8055011ae4b67b
-
SHA256
8460550de9a6423044140fc3c8f322b9bd35c24277455d879b792fd7edf88f40
-
SHA512
34d278f0a964195e518ce3308a69a9f44a25bec18924a43c20e74b4d8065629b7f3059e64a9fac2c42af73f74e7a0dd64e6c586b90a343553c4f5b8ef96e6049
-
SSDEEP
192:+Bksub9MuIOieMZZ35a93Vnjdwqzl3+Fedi:vl7ieM16FnhwqBLd
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2104 3e76bf1a6f5ed603dfd632041f144153.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2752 2104 3e76bf1a6f5ed603dfd632041f144153.exe 28 PID 2104 wrote to memory of 2752 2104 3e76bf1a6f5ed603dfd632041f144153.exe 28 PID 2104 wrote to memory of 2752 2104 3e76bf1a6f5ed603dfd632041f144153.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e76bf1a6f5ed603dfd632041f144153.exe"C:\Users\Admin\AppData\Local\Temp\3e76bf1a6f5ed603dfd632041f144153.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2104 -s 9042⤵PID:2752
-