Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 01:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe
-
Size
874KB
-
MD5
c3191e226fa56eaf0f574ec73c328469
-
SHA1
64ee9eb2f3953cb62b0b98b13c375fbee1892d93
-
SHA256
0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41
-
SHA512
18301ba0043ec222a8c6907c275d8d811be8b2234ead812706a680a6c1431f738527db53c0893942135295bf8ed23bf64f73bd2aefb4667d220ddbc318a2ca39
-
SSDEEP
24576:LeFmt+PTimCz4DbeYuZYqSGzLhImOOlcWd6OVyE7yn4Rt:LmM+PmmCz4Dyr4GRZJlcWcu57n
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1232 0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1768 1232 0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe 28 PID 1232 wrote to memory of 1768 1232 0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe 28 PID 1232 wrote to memory of 1768 1232 0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe"C:\Users\Admin\AppData\Local\Temp\0fead1eec703dc70cd1eea9e557876b3525d9292ff97b46edfe0720e6856fc41.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1232 -s 5682⤵PID:1768
-