Analysis
-
max time kernel
122s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
cd2e9c696063b5e58fe4df129763dc1ea6d11315706eeb01a05965b7976e757d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cd2e9c696063b5e58fe4df129763dc1ea6d11315706eeb01a05965b7976e757d.exe
Resource
win10v2004-20231215-en
General
-
Target
cd2e9c696063b5e58fe4df129763dc1ea6d11315706eeb01a05965b7976e757d.exe
-
Size
705KB
-
MD5
5abda9c4030fb2ad6ec2ee97b15f8239
-
SHA1
974d031cfcdd7393e2ebd06ce74025ce1f5fff2d
-
SHA256
cd2e9c696063b5e58fe4df129763dc1ea6d11315706eeb01a05965b7976e757d
-
SHA512
ddf6d25a6204fdef91d3f2774141d207f2b659ffb947829d47c8821abd5c76ee62ced07fd30313adf7ccf9198965f2db760524807d842bd373598bcf391f1faa
-
SSDEEP
12288:aA9B+V/7d0NxksRpWE9FRHSfNm1wgbIxnBw7dzE+e3gxZC6LgjigDy5fdv8fWi+:aA9BGCks7WE9F5pwg8zmdqQjC60jiHkU
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe cd2e9c696063b5e58fe4df129763dc1ea6d11315706eeb01a05965b7976e757d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2628 cd2e9c696063b5e58fe4df129763dc1ea6d11315706eeb01a05965b7976e757d.exe