Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
853a6cbb5df290b69081abefb762d13d472f63ccc9db7affda5440da7edb4225.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
853a6cbb5df290b69081abefb762d13d472f63ccc9db7affda5440da7edb4225.exe
Resource
win10v2004-20240226-en
General
-
Target
853a6cbb5df290b69081abefb762d13d472f63ccc9db7affda5440da7edb4225.exe
-
Size
1.2MB
-
MD5
9b027cdaa0ae8aacaa109ff327a2822e
-
SHA1
516d858a3e02e5d94e62bc72332feb0822dfbe9d
-
SHA256
853a6cbb5df290b69081abefb762d13d472f63ccc9db7affda5440da7edb4225
-
SHA512
98210f696197e301c042016d13b4338243897fa997bf3f1dab9aa1e5604586794d7717f25fe41814e402922b3d07215b9afc57bf9c3a8b1957326b60693fdf5d
-
SSDEEP
12288:ac8+Tn6VMP5CPU6EkUw6XvV2NlLiwXmVmMdpx7TjLNFtA2byK9CTIb7f:a3+L6VMRCPU6CENltmVVdpx7fLrQWd
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 853a6cbb5df290b69081abefb762d13d472f63ccc9db7affda5440da7edb4225.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2212 853a6cbb5df290b69081abefb762d13d472f63ccc9db7affda5440da7edb4225.exe