Analysis
-
max time kernel
838s -
max time network
840s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 07:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
download.exe
Resource
win10-20240404-en
windows10-1703-x64
19 signatures
1200 seconds
Behavioral task
behavioral2
Sample
download.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
1200 seconds
Behavioral task
behavioral3
Sample
download.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
21 signatures
1200 seconds
General
-
Target
download.exe
-
Size
88KB
-
MD5
94c73dc6cc79de28524a82f04adc7c6b
-
SHA1
8ce1411adede8a1485ad718160ef01c7a22634de
-
SHA256
40596da4af2b1b0387147484d112423d317e2fd41cd19bb1b63d2f8429bacee4
-
SHA512
820b38de02b00668b24e6dc0510f632a7648bd1e647f5a9ee0c7d8bd8b86a49b55db72e1cfa2eff0337dc30d6b1cb45af1f904a9105715618d410ff56841d041
-
SSDEEP
768:+CIFqF93IfXwXbOfq1okh8BBEjpaPWfu/WYat7PTXDvt976xrXu5Me0:+C4qF9pbOAh8B+Bfu+YaZTXTt97KruM
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1728 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1980 1652 download.exe 28 PID 1652 wrote to memory of 1980 1652 download.exe 28 PID 1652 wrote to memory of 1980 1652 download.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1652 -s 5122⤵PID:1980
-
-
C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728