Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exe
Resource
win10v2004-20240508-en
General
-
Target
d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exe
-
Size
716KB
-
MD5
d5cb0b98701a55ab7441e26c20f7d4f7
-
SHA1
32b08b2c3485861a5d219acc70048c864d5c7872
-
SHA256
d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161
-
SHA512
48f9d2bca05e114d707abd9ec3a23e3ca2d5fd8615e526c187a84d67d5a47395f040dcb3afe8d6e38430870aea0f2e22576f33a4d3c5f6496b58628c35108678
-
SSDEEP
12288:n3P/aK2vB+HFqXCRQSjMU3O5s+N6NhOlFVlVsTot16+DrgAPs4F2Y7YJba2EUYht:n/CKABvSRQ5UOOU62FBnO+E222YJbNEK
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exedescription pid process Token: SeTakeOwnershipPrivilege 1688 d72bea4a04c7b67a7d8baca4f2b40918cfcc9732ae25540e1a374c5560653161.exe