Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
54fe306d3fefa3bf415871df516f921bc8b06a30836676925aafbb9e396baa9f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
54fe306d3fefa3bf415871df516f921bc8b06a30836676925aafbb9e396baa9f.exe
Resource
win10v2004-20240508-en
General
-
Target
54fe306d3fefa3bf415871df516f921bc8b06a30836676925aafbb9e396baa9f.exe
-
Size
1.3MB
-
MD5
d8b58bb037ce10f9e2e36cb8ab1f8df4
-
SHA1
eac167858da221abaa332fe51a82ed1f2fb373e2
-
SHA256
54fe306d3fefa3bf415871df516f921bc8b06a30836676925aafbb9e396baa9f
-
SHA512
69857725d48317700b2397b144f590d9643d268c8b98353a01971cc55b0af9a5877096ac23c6e5c2ee79a0ac32d5b90cfeba1d2fbfe13e3cbf5c80898ebd6755
-
SSDEEP
12288:AtP/aK2vB+CMTmkJR4Do07Y86gw5CtCjX+NLuFhNpBeZT3X:ABCKAB+SkQ/7Gb8NLEbeZ
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 54fe306d3fefa3bf415871df516f921bc8b06a30836676925aafbb9e396baa9f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2100 54fe306d3fefa3bf415871df516f921bc8b06a30836676925aafbb9e396baa9f.exe