Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
a1b7b70910bf43da4c9be55ed32aa40c689703fc221d3c211545bc7579798656.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1b7b70910bf43da4c9be55ed32aa40c689703fc221d3c211545bc7579798656.exe
Resource
win10v2004-20231215-en
General
-
Target
a1b7b70910bf43da4c9be55ed32aa40c689703fc221d3c211545bc7579798656.exe
-
Size
1.7MB
-
MD5
f15206b14293f2a87fecf63f705666b0
-
SHA1
857b13e790bb02d2200ae7abfe5d1a9783116920
-
SHA256
a1b7b70910bf43da4c9be55ed32aa40c689703fc221d3c211545bc7579798656
-
SHA512
6f9b773b6a38a1a064aa0b2ad8382142a4ba29d7eb794866270d8125f4c72c2e672efc3ac48d0a9af60b415fffc5dbd5766cbe1ddc60476cea9117a46d065d78
-
SSDEEP
24576:hSxSNaAyi9hN0rTduSZpUR0GHrVQ1aW4mSOgv3isi:hSx85yi9z0NpAHrVQ1/fSNvi
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe a1b7b70910bf43da4c9be55ed32aa40c689703fc221d3c211545bc7579798656.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4492 a1b7b70910bf43da4c9be55ed32aa40c689703fc221d3c211545bc7579798656.exe