Analysis
-
max time kernel
3s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 23:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Pulzera.exe
Resource
win7-20240708-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Pulzera.exe
Resource
win10-20240611-en
3 signatures
150 seconds
Behavioral task
behavioral3
Sample
Pulzera.exe
Resource
win11-20240709-en
3 signatures
150 seconds
General
-
Target
Pulzera.exe
-
Size
193KB
-
MD5
5193eb515c0330206527dc3f83650bfe
-
SHA1
b8278ad29661f59cec26394266f635ea5b674ce4
-
SHA256
f423254c861900965e5186819a6d2a8710aa9d60c5de7b2e5da097b19b153942
-
SHA512
930a2ccc697baf321f7451e02abbafea658c03cb074cab8363b9c3565a68cd8eba1bd4d991ad1ef5221b83a27b2c12e1902c29961d1972249bc1b86e87e036ba
-
SSDEEP
3072:5bzWNPsAnT6e5yRidFEupXvVxRXscNRy8BUmIfcIGGNLmy222t7iBL6kckTMGt8:5bKPiao4pXvVxRXsGRNIv222mL6kcYt
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 discord.com 5 discord.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2464 2108 WerFault.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 Pulzera.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2464 2108 Pulzera.exe 31 PID 2108 wrote to memory of 2464 2108 Pulzera.exe 31 PID 2108 wrote to memory of 2464 2108 Pulzera.exe 31 PID 2108 wrote to memory of 2464 2108 Pulzera.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pulzera.exe"C:\Users\Admin\AppData\Local\Temp\Pulzera.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 10722⤵
- Program crash
PID:2464
-