Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe
Resource
win10v2004-20240802-en
General
-
Target
6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe
-
Size
497KB
-
MD5
60fdae7957c24a52dcb84aa1802edbd4
-
SHA1
4f38d0c6f43e8d6efaa6d4355d563213b0cf6866
-
SHA256
6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676
-
SHA512
9367458d72ba32b3e0542c94afc0ea6f3cf5c5fcbb17f45cac917ea1f35225292de9185a8b5df60e6bb43047c4546c638489addc41db4f052094224b053057fc
-
SSDEEP
1536:CH8HxsM08Tcgc92csCGlTyzUuZ0SVPRiNaQnFYUHKa/GUkgGPYSLgVay+Zm1SMhf:PZGmtFfqgOYSLgf+ZmRvV5FPV
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe Token: SeDebugPrivilege 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 884 wrote to memory of 6080 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe 31 PID 884 wrote to memory of 6080 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe 31 PID 884 wrote to memory of 6080 884 6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe"C:\Users\Admin\AppData\Local\Temp\6c481a8149442be4fdae9158e9275ef3c3c918040b387ce5248050f88da87676.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 884 -s 16242⤵PID:6080
-