Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 18:50
Behavioral task
behavioral1
Sample
3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe
-
Size
1.4MB
-
MD5
258a2e1ad3af4885e9673ef682b0cc0e
-
SHA1
028c606f3aacc9c0b93a995a732f27d3bf369b3c
-
SHA256
3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316
-
SHA512
fe20400affc3b87d514bad909a1ab4e866c5b0b56e489b91e1a1426e10804264903ce2b5171cf0fe8e59a4833c4ba0e3aa41fbcb0608a8d55fd2ad9347bbfa55
-
SSDEEP
24576:bQdnyqwGxVsxD9m02dT4sqJDDfyNYpXDSv5bJ7:WeGHsxxmNEsq9qNYp+V7
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2092 3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2092 3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1644 2092 3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe 30 PID 2092 wrote to memory of 1644 2092 3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe 30 PID 2092 wrote to memory of 1644 2092 3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe"C:\Users\Admin\AppData\Local\Temp\3ef835294180d5003717c5d8c8f91acc97ea6f39b100a6ab0808e2afc8ec3316.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2092 -s 7882⤵PID:1644
-