Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
41742b1bcffca5e5b1b94afa266db2118d7d8da188dd6503b64ffb2b94a65b0e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
41742b1bcffca5e5b1b94afa266db2118d7d8da188dd6503b64ffb2b94a65b0e.exe
Resource
win10v2004-20240226-en
General
-
Target
41742b1bcffca5e5b1b94afa266db2118d7d8da188dd6503b64ffb2b94a65b0e.exe
-
Size
1.6MB
-
MD5
3fee4dfce67f9820e736a7e5c914a19d
-
SHA1
8545b1e87017478f653f755729bd04ef278fa9f9
-
SHA256
41742b1bcffca5e5b1b94afa266db2118d7d8da188dd6503b64ffb2b94a65b0e
-
SHA512
a3796d5d1acc42c0de9bf2c4df2c2e801ade961f23c5f92f434c004e82000175267e2b7c94dc0a140b95284e7d880922b34e32f0c2be6521c2229b45931072c4
-
SSDEEP
12288:7riB+tuUMAdB8qr0zw9iXQ40AOzDr5YJjsF/5v3ZkHRik8:7riBdatr0zAiX90z/F0jsFB3SQk
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 41742b1bcffca5e5b1b94afa266db2118d7d8da188dd6503b64ffb2b94a65b0e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1600 41742b1bcffca5e5b1b94afa266db2118d7d8da188dd6503b64ffb2b94a65b0e.exe