Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 14:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53c1a5745bbb153e47b87d8f9efa152f.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
53c1a5745bbb153e47b87d8f9efa152f.exe
Resource
win10v2004-20231222-en
1 signatures
150 seconds
General
-
Target
53c1a5745bbb153e47b87d8f9efa152f.exe
-
Size
9KB
-
MD5
53c1a5745bbb153e47b87d8f9efa152f
-
SHA1
23f0c8e4e9ba20b05760652a748351f2590ac910
-
SHA256
74304575e12862d0c11c52ec8a981b941391e7e272fa253a62c612165ae78f8d
-
SHA512
5c4308df9705807e5c685f22e4d48cbcc41ec95547c47604182cfa6db7f158b45e8b712308ad261ea4a9def4aa0d7c1934d91a3628208f550ab320d9d22bb4c7
-
SSDEEP
192:xBksurzHNQDGeMZZ3C93Vnjdwqz336QSvC:OH8GeMeFnhwqbqRv
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 53c1a5745bbb153e47b87d8f9efa152f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2564 2224 53c1a5745bbb153e47b87d8f9efa152f.exe 30 PID 2224 wrote to memory of 2564 2224 53c1a5745bbb153e47b87d8f9efa152f.exe 30 PID 2224 wrote to memory of 2564 2224 53c1a5745bbb153e47b87d8f9efa152f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c1a5745bbb153e47b87d8f9efa152f.exe"C:\Users\Admin\AppData\Local\Temp\53c1a5745bbb153e47b87d8f9efa152f.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2224 -s 9002⤵PID:2564
-