Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 18:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72c920a711b6103f79b0bd890713b685.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
72c920a711b6103f79b0bd890713b685.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
72c920a711b6103f79b0bd890713b685.exe
-
Size
9KB
-
MD5
72c920a711b6103f79b0bd890713b685
-
SHA1
5f52464506613f258fc6942aa46fd9aef1eb203c
-
SHA256
421f0c0edbad1fb0c8f62c53b05583272a695760cf4a942157f96a4d1eebe342
-
SHA512
aad17facb779cc28d072cf065329be9c7c4a5250b9165046fa02a166e6806b6fb75f987a8ad4f402480fe8e359495e251e58de43f01adb873654d5a4efb312a6
-
SSDEEP
192:xBksunPY82gQv5F43tReMZZ3u93VnjdwCzP3pWzZ:j82l43tReMSFnhwCjS
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 72c920a711b6103f79b0bd890713b685.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2044 1752 72c920a711b6103f79b0bd890713b685.exe 28 PID 1752 wrote to memory of 2044 1752 72c920a711b6103f79b0bd890713b685.exe 28 PID 1752 wrote to memory of 2044 1752 72c920a711b6103f79b0bd890713b685.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c920a711b6103f79b0bd890713b685.exe"C:\Users\Admin\AppData\Local\Temp\72c920a711b6103f79b0bd890713b685.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1752 -s 8962⤵PID:2044
-