Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe
Resource
win10v2004-20240226-en
General
-
Target
38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe
-
Size
1.7MB
-
MD5
1e5409ab97b978d1c18438908ecd801c
-
SHA1
f148c6345480572f4e3af25429342ae5eca13ced
-
SHA256
38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9
-
SHA512
065c73e547510ef63516920ff23870b7db09c287e5cdd7730afd17e99e5671063689dfe492960945466b69867bb9ce742e06269d2088b3156d8521fa9e5cc8ab
-
SSDEEP
24576:7vmHl4iKj2XlJ6Zet/IBL+XmF3yRTlpXFX2IvL2IvLvqwAPBODpXF:7eHHt/Iua
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 848 38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe 848 38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 848 38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 3000 848 38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe 28 PID 848 wrote to memory of 3000 848 38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe 28 PID 848 wrote to memory of 3000 848 38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe"C:\Users\Admin\AppData\Local\Temp\38008e40d5610b44c1469a93b82643415b10578d18b6535cb67bd5927ccd24e9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 848 -s 6402⤵PID:3000
-