Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 06:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d56a0e6d3b52631eef64a5a13a853b0d.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d56a0e6d3b52631eef64a5a13a853b0d.exe
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
d56a0e6d3b52631eef64a5a13a853b0d.exe
-
Size
9KB
-
MD5
d56a0e6d3b52631eef64a5a13a853b0d
-
SHA1
9ed1cb6f353c66624be09191e28f55b74085d78a
-
SHA256
95f246104de157265b8e09490e4039062613eb2817039dfb8d9c96af76dff61b
-
SHA512
6ab1131da950e7a996e680e6513f8f949818ca864333eb829f8e7ee4147b26ecb360f3076216eeca0cdd04d4b1ec0abc7a06d5a6a6dbc69af8fb365aed26602e
-
SSDEEP
192:jBksunrN3y+dVeMZZ3k93VnjdwCzP3Gtvz:EZ7VeMYFnhwCL2tv
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 d56a0e6d3b52631eef64a5a13a853b0d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2256 3004 d56a0e6d3b52631eef64a5a13a853b0d.exe 28 PID 3004 wrote to memory of 2256 3004 d56a0e6d3b52631eef64a5a13a853b0d.exe 28 PID 3004 wrote to memory of 2256 3004 d56a0e6d3b52631eef64a5a13a853b0d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d56a0e6d3b52631eef64a5a13a853b0d.exe"C:\Users\Admin\AppData\Local\Temp\d56a0e6d3b52631eef64a5a13a853b0d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3004 -s 9002⤵PID:2256
-