Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
6fbaa6841a85be589b0b1b3e5af33173ac1b48cd71bf7e36bfc4920688db03dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6fbaa6841a85be589b0b1b3e5af33173ac1b48cd71bf7e36bfc4920688db03dd.exe
Resource
win10v2004-20240226-en
General
-
Target
6fbaa6841a85be589b0b1b3e5af33173ac1b48cd71bf7e36bfc4920688db03dd.exe
-
Size
1.4MB
-
MD5
f6a4a0dcba571f14d38bd74ad168914f
-
SHA1
1e43bcd78556d3afcf38e304d1305fade9051392
-
SHA256
6fbaa6841a85be589b0b1b3e5af33173ac1b48cd71bf7e36bfc4920688db03dd
-
SHA512
64dce2e9e8cee4457a756e83f39d9ee95afc9bcb9cf8ac62f1ac54a5d1417059266e58f5bff13c1a0c56270c7473c8c74339dda136012ab8d7a87a2635d2e6cb
-
SSDEEP
24576:Ck9BAWHRlMugdD+JsRgZRJ4fM430Eg6nET7M/IiN:CcpxlMPdlR8v4UC0Eg6ET7M/I
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 6fbaa6841a85be589b0b1b3e5af33173ac1b48cd71bf7e36bfc4920688db03dd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 844 6fbaa6841a85be589b0b1b3e5af33173ac1b48cd71bf7e36bfc4920688db03dd.exe