Analysis
-
max time kernel
4294183s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
14-04-2022 12:36
Static task
static1
Behavioral task
behavioral1
Sample
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe
Resource
win7-20220311-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe
Resource
win10v2004-20220331-en
0 signatures
0 seconds
General
-
Target
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe
-
Size
989KB
-
MD5
20d41b23ce125d7ae86c1a1e5b9d208c
-
SHA1
99967b9cc47e145819bd5e0d58200497f07e5b0b
-
SHA256
4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd
-
SHA512
a719386808b620c157e6e80f2615ae4fe68c73a677ac9bd43b72093d339dfc16ff55efe374d8c1832718e5c8aeb2cd1c66a9d38261c218aa4d2c17c2376d8094
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2028 wrote to memory of 940 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 29 PID 2028 wrote to memory of 940 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 29 PID 2028 wrote to memory of 940 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 29 PID 2028 wrote to memory of 940 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 29 PID 2028 wrote to memory of 752 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 30 PID 2028 wrote to memory of 752 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 30 PID 2028 wrote to memory of 752 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 30 PID 2028 wrote to memory of 752 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 30 PID 2028 wrote to memory of 1952 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 31 PID 2028 wrote to memory of 1952 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 31 PID 2028 wrote to memory of 1952 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 31 PID 2028 wrote to memory of 1952 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 31 PID 2028 wrote to memory of 2040 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 32 PID 2028 wrote to memory of 2040 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 32 PID 2028 wrote to memory of 2040 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 32 PID 2028 wrote to memory of 2040 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 32 PID 2028 wrote to memory of 1032 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 33 PID 2028 wrote to memory of 1032 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 33 PID 2028 wrote to memory of 1032 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 33 PID 2028 wrote to memory of 1032 2028 4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"{path}"2⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"{path}"2⤵PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"{path}"2⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"{path}"2⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\4ce893759b9551b85e7da9a9240da89250ae2caebdec09399deab52128f816fd.exe"{path}"2⤵PID:1032
-