Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 19:30
Behavioral task
behavioral1
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
d1f0f17e91e91cc4e1647c2aa8a7f39af2793125.exe
Resource
win10v2004-20240802-en
General
-
Target
1d4946ea77a2bcf432f490d0a38429102a51069b.exe
-
Size
151KB
-
MD5
f635582929e0b0f2f18e1ee1fb7a84e9
-
SHA1
1d4946ea77a2bcf432f490d0a38429102a51069b
-
SHA256
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d
-
SHA512
0a4ac0362ebf4ce81fb187d93898e3ffdf74e6a0da96913818ebbb59a236a3897ec680cdc4599a9cf8cee8f8b7d527c4fc0abf89016bab48449995d10065d1e7
-
SSDEEP
3072:mQHKadVFHUg2HiFI9ifi5iLLbyq8QL+wI7BJlwEKctby:BqSF/2HQlLLbyq8QL+wI7BJiEK
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
208
-
token
xehook208262680500151
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d4946ea77a2bcf432f490d0a38429102a51069b.exedescription pid Process Token: SeDebugPrivilege 3000 1d4946ea77a2bcf432f490d0a38429102a51069b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1d4946ea77a2bcf432f490d0a38429102a51069b.exedescription pid Process procid_target PID 3000 wrote to memory of 1936 3000 1d4946ea77a2bcf432f490d0a38429102a51069b.exe 30 PID 3000 wrote to memory of 1936 3000 1d4946ea77a2bcf432f490d0a38429102a51069b.exe 30 PID 3000 wrote to memory of 1936 3000 1d4946ea77a2bcf432f490d0a38429102a51069b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d4946ea77a2bcf432f490d0a38429102a51069b.exe"C:\Users\Admin\AppData\Local\Temp\1d4946ea77a2bcf432f490d0a38429102a51069b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3000 -s 10642⤵PID:1936
-