Overview
overview
10Static
static
101d4946ea77...9b.exe
windows7-x64
101d4946ea77...9b.exe
windows10-1703-x64
101d4946ea77...9b.exe
windows10-2004-x64
101d4946ea77...9b.exe
windows11-21h2-x64
10d1f0f17e91...25.exe
windows7-x64
1d1f0f17e91...25.exe
windows10-1703-x64
7d1f0f17e91...25.exe
windows10-2004-x64
3d1f0f17e91...25.exe
windows11-21h2-x64
3Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 15:57
Behavioral task
behavioral1
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win11-20240802-en
General
-
Target
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
-
Size
151KB
-
MD5
f635582929e0b0f2f18e1ee1fb7a84e9
-
SHA1
1d4946ea77a2bcf432f490d0a38429102a51069b
-
SHA256
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d
-
SHA512
0a4ac0362ebf4ce81fb187d93898e3ffdf74e6a0da96913818ebbb59a236a3897ec680cdc4599a9cf8cee8f8b7d527c4fc0abf89016bab48449995d10065d1e7
-
SSDEEP
3072:mQHKadVFHUg2HiFI9ifi5iLLbyq8QL+wI7BJlwEKctby:BqSF/2HQlLLbyq8QL+wI7BJiEK
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
208
-
token
xehook208262680500151
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2716 1d4946ea77a2bcf432f490d0a38429102a51069b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1192 2716 1d4946ea77a2bcf432f490d0a38429102a51069b.exe 29 PID 2716 wrote to memory of 1192 2716 1d4946ea77a2bcf432f490d0a38429102a51069b.exe 29 PID 2716 wrote to memory of 1192 2716 1d4946ea77a2bcf432f490d0a38429102a51069b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d4946ea77a2bcf432f490d0a38429102a51069b.exe"C:\Users\Admin\AppData\Local\Temp\1d4946ea77a2bcf432f490d0a38429102a51069b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2716 -s 10602⤵PID:1192
-