Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16-05-2021 03:23
Static task
static1
Behavioral task
behavioral1
Sample
82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe
-
Size
284KB
-
MD5
20acfcd784e83f9e31cf6dcea58b293a
-
SHA1
9678f409aabdafe1b2898fae408a8e67ef3fc9d7
-
SHA256
82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2
-
SHA512
8af9df96ed10e28a40617d8e716dbcde8508e97966f44a4e9d01db44935fe187a3b947634192b2f3d7c2e81f656c75fc3b8441ffdd154400a22f5016fa1cb6ad
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exedescription pid process Token: SeIncreaseQuotaPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeSecurityPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeTakeOwnershipPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeLoadDriverPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeSystemProfilePrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeSystemtimePrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeProfSingleProcessPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeIncBasePriorityPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeCreatePagefilePrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeBackupPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeRestorePrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeShutdownPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeDebugPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeSystemEnvironmentPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeChangeNotifyPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeRemoteShutdownPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeUndockPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeManageVolumePrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeImpersonatePrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: SeCreateGlobalPrivilege 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: 33 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: 34 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: 35 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe Token: 36 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exepid process 644 82cc814e05612394460f44ad035b4345bffb86787ca9b38be308e4b8b0c1f0b2.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/644-114-0x0000000000BD0000-0x0000000000BD1000-memory.dmpFilesize
4KB