Analysis
-
max time kernel
154s -
max time network
156s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07-09-2021 06:11
Behavioral task
behavioral1
Sample
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe
-
Size
43KB
-
MD5
119fa29ca64f8a3be7b042bc75080c70
-
SHA1
f9e527da23c90f285441946fad023e072c5bfb44
-
SHA256
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d
-
SHA512
05b0cd698923a7cf7b5f7089b1b720a53f1f6c34a4d57642e7fe2c1cb7cb835ac0a8eda06b2c129145e8b2a4eccc5f97f610a85919e6ebae576b1e47d1b01c94
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exepid process 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exedescription pid process Token: SeDebugPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: 33 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe Token: SeIncBasePriorityPrivilege 1020 4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe"C:\Users\Admin\AppData\Local\Temp\4e3cb358f643577cbd3b9354466b2640dfaf08150105d532bf7a0e938510da4d.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken