Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exe
Resource
win10v2004-20240226-en
General
-
Target
3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exe
-
Size
1.2MB
-
MD5
f36e3b263702667ab44fc136e234b2d2
-
SHA1
5c442b5206741baf13a6319ff056fa2e70bd6bf7
-
SHA256
3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565
-
SHA512
230316862d9de91c0f55323e60b4e712e682a94472eff551cb239d4023050a576896050a4dc30b1602258d8a0830fa9f9ca59b34dfc6b0f039baff72b5c15572
-
SSDEEP
12288:XSq4+/x8J7ct3z5htUcQ1MlhrmQgwwJzt5+7fyZkCtXFiWZF/3o:XSq4+mIJz5IcuMlQHJxrDiSi
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exedescription ioc process File opened for modification C:\Windows\System32\alg.exe 3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exedescription pid process Token: SeTakeOwnershipPrivilege 1628 3c834ab8ee009e6bad522d5851965ff98513995306e34464faa05f92d82f9565.exe