Analysis
-
max time kernel
102s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 11:47
Static task
static1
Behavioral task
behavioral1
Sample
5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe
-
Size
1.4MB
-
MD5
d66ffec81fd167adfb0505744f4df31e
-
SHA1
7e9fbbf1d04316334ee46cfa923330dc63b3155b
-
SHA256
5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915
-
SHA512
227a7f30d8e02460c6a5798b26edc60e3fead6059407287fe696f5bcc63a3e4aab43f7b5e58ef6f26c4498cbad50371af3b3e302c8c3cf9dd90d8302072a3a84
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\new driver.lnk 5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exedescription pid process Token: 35 4160 5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe