Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 23:06
Static task
static1
Behavioral task
behavioral1
Sample
4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe
Resource
win10v2004-20241007-en
General
-
Target
4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe
-
Size
1.3MB
-
MD5
a3dfc070755d94030ad0e7627a0c8440
-
SHA1
f770be3504c1846226302c1b61ac55a379fb913c
-
SHA256
4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854
-
SHA512
6426241b13edfa3ea3d0538a52581f31f7b5fb5e1a7389fe2a2c4b05349bd572b8362ca55d969067ab2ad6d6f8fdfc6aca63a371ad2e0e5820425f2c730e1ca3
-
SSDEEP
24576:pJutuFWvPDnW22ibKGed8oZ2abjmiJlUafCz2BSTZQMS0fUwSB2dyKcjNyqkPL:S0m2yKGUZ/bqgiax2eESB2dOkP
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VersionString.vbs 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 392 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 392 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe Token: SeDebugPrivilege 392 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 4896 392 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe 29 PID 392 wrote to memory of 4896 392 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe 29 PID 392 wrote to memory of 4896 392 4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe"C:\Users\Admin\AppData\Local\Temp\4112fd7d49336a390f856b252e13d9b198b54307e5499a00df45ac66c8211854N.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 392 -s 6802⤵PID:4896
-