Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 16:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8753fd0f95dd863e8466319c025f3cab.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8753fd0f95dd863e8466319c025f3cab.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
8753fd0f95dd863e8466319c025f3cab.exe
-
Size
24KB
-
MD5
8753fd0f95dd863e8466319c025f3cab
-
SHA1
4fc2700a5c35dfd25b95c0657bd1f25f941a1486
-
SHA256
cab0fbe0e31af603ceb54ea7e21af9fcc3d01158251670a67f9181224810c1f9
-
SHA512
496a6450a5d776eec9f7ce784963c183c984b25c62550a1f83c5b9403781d90bf062232d23ea2b3d2fc75df627a37b53a3d5a92f36849921cde56b641d3afcba
-
SSDEEP
384:2ddmAkbFyDXnxRCDogW/8AoW0fQFxH/f4kVdjaLacmkC0GJsJxXSdqWxDEWl:RVbFmhQDoqA6fQFxfftjaLacmkLGK+3
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\systemInfomations.ini 8753fd0f95dd863e8466319c025f3cab.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2988 8753fd0f95dd863e8466319c025f3cab.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1248 2988 8753fd0f95dd863e8466319c025f3cab.exe 28 PID 2988 wrote to memory of 1248 2988 8753fd0f95dd863e8466319c025f3cab.exe 28 PID 2988 wrote to memory of 1248 2988 8753fd0f95dd863e8466319c025f3cab.exe 28 PID 2988 wrote to memory of 1248 2988 8753fd0f95dd863e8466319c025f3cab.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8753fd0f95dd863e8466319c025f3cab.exe"C:\Users\Admin\AppData\Local\Temp\8753fd0f95dd863e8466319c025f3cab.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1248
-