Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802N.exe
Resource
win7-20240903-en
2 signatures
120 seconds
General
-
Target
77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802N.exe
-
Size
1.3MB
-
MD5
11630c91bda711d69c0b1c80527d58c0
-
SHA1
9c599ff3114b84640276eaf25d1d321baec46c47
-
SHA256
77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802
-
SHA512
203e5aa9a2626e31c08bb151374ad5c2221eab381c73a967cb7a2f9010689de4d130ebf1da37ce36d992c664c64f6c8e1565628303233399284b98e25be9329c
-
SSDEEP
24576:ONiCgn16ZTlhtctmeP2kdk+V8q3vi0m+dn5hkoOWuXJE:ONcnUZphtcgePN++pPkx5
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2384 77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802N.exe"C:\Users\Admin\AppData\Local\Temp\77198028aa9ae20904882c4ded43d5efe7588a8f5f1a90a83cd0e8af41e9a802N.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2384