Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17-01-2024 22:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
63c22ca8cfaa5a7f9b367f231137a244.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
63c22ca8cfaa5a7f9b367f231137a244.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
63c22ca8cfaa5a7f9b367f231137a244.exe
-
Size
9KB
-
MD5
63c22ca8cfaa5a7f9b367f231137a244
-
SHA1
863b3b0c1185f9ed57f718b045792f8f1eee39c8
-
SHA256
fd9b60e830dbb5d864d5243a6826b16d0edc53b1e62df9532e2b56e784f7050d
-
SHA512
3bec92987b1583c8abd650e5c2bcd9c0787d1c39b3ce90f481e1f60874bc9c9692cdd2ae6ae8772d07b176813a0a65fb4a2dcbaf79c52628f79ad6e9a17c4429
-
SSDEEP
192:4Bksu/zHNQtEheMZZ3693VnjdwqzW3zApW:nHSEheMeFnhwqaDy
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 63c22ca8cfaa5a7f9b367f231137a244.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2740 1152 63c22ca8cfaa5a7f9b367f231137a244.exe 28 PID 1152 wrote to memory of 2740 1152 63c22ca8cfaa5a7f9b367f231137a244.exe 28 PID 1152 wrote to memory of 2740 1152 63c22ca8cfaa5a7f9b367f231137a244.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c22ca8cfaa5a7f9b367f231137a244.exe"C:\Users\Admin\AppData\Local\Temp\63c22ca8cfaa5a7f9b367f231137a244.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1152 -s 9002⤵PID:2740
-