Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Order 29 08.exe
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Order 29 08.exe
Resource
win10v2004-20241007-en
5 signatures
150 seconds
General
-
Target
Order 29 08.exe
-
Size
42KB
-
MD5
7c7af4da53ab26768f76dbaa2198641b
-
SHA1
89703a660a1da55ee26e3af201e0703fab1f3ab2
-
SHA256
88dc7ea656c2375d737c1779f8619fbe9a6995f8b4350de7376d509d41996224
-
SHA512
8812fa9eef938deb840ef0d7570ac8edfc54eeb76aa4792e92cf6c0edfb4c1a34f617c15fa266195eddfa2bc0d226fed568f8649456f7a50447f29cfe1488603
-
SSDEEP
768:MeUB9hYaob18u2GWm2GWm2GWm2GWm2Gp/K:MtX/u2GWm2GWm2GWm2GWm2GFK
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1632 Order 29 08.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1632 Order 29 08.exe Token: SeDebugPrivilege 1632 Order 29 08.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 4848 1632 Order 29 08.exe 31 PID 1632 wrote to memory of 4848 1632 Order 29 08.exe 31 PID 1632 wrote to memory of 4848 1632 Order 29 08.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order 29 08.exe"C:\Users\Admin\AppData\Local\Temp\Order 29 08.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1632 -s 10962⤵PID:4848
-