Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 14:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a20c07ddc3ecc4c1b0119452482c2665.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
a20c07ddc3ecc4c1b0119452482c2665.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
a20c07ddc3ecc4c1b0119452482c2665.exe
-
Size
9KB
-
MD5
a20c07ddc3ecc4c1b0119452482c2665
-
SHA1
562ea113b01a65f6efdb0cb7cb25fb4bcab04294
-
SHA256
c7086a2fab3302e8efcfb84db3d28ca1fa00b55bf6f65c089d95c51e6b2c341d
-
SHA512
c8c0ff6cb29347e598a8de13febb6f1ae39dd36dd0537254ab84563f7276de26c010f60a3f2007204a2cc3febaf42bd62507de83fc6cf6cf6cb3f4f12c034bd1
-
SSDEEP
192:NBksuXzHNQjNeMZZ3793Vnjdwqzt3YODuw5Sr:GHENeMlFnhwqRoODf5
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2292 a20c07ddc3ecc4c1b0119452482c2665.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2632 2292 a20c07ddc3ecc4c1b0119452482c2665.exe 28 PID 2292 wrote to memory of 2632 2292 a20c07ddc3ecc4c1b0119452482c2665.exe 28 PID 2292 wrote to memory of 2632 2292 a20c07ddc3ecc4c1b0119452482c2665.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a20c07ddc3ecc4c1b0119452482c2665.exe"C:\Users\Admin\AppData\Local\Temp\a20c07ddc3ecc4c1b0119452482c2665.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2292 -s 9002⤵PID:2632
-