Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2022 21:16
Static task
static1
Behavioral task
behavioral1
Sample
00134d170f4ba51a549e1b1d0886c0ff.exe
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
00134d170f4ba51a549e1b1d0886c0ff.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
00134d170f4ba51a549e1b1d0886c0ff.exe
-
Size
25KB
-
MD5
00134d170f4ba51a549e1b1d0886c0ff
-
SHA1
58b70e231da1c32d8cce5bd304662003dc630fad
-
SHA256
72a107eca1b503eba9d0e966f18567a2abad84614d8fec19b9704613c019f2c7
-
SHA512
df33ae915144c1c32f5bacf64ce3dc8785677dbdbab3e0ffe0bb8a14c18f48f4322505b946dc7a2abba9338016ca6807b58bccacf7324be822b9fb283b9f2d8e
-
SSDEEP
768:svpLJdeWaUjZwpZbNUqqv8jwJEip+16A0:QnGUjZqpZj+Eip/
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
00134d170f4ba51a549e1b1d0886c0ff.exepid process 4612 00134d170f4ba51a549e1b1d0886c0ff.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
00134d170f4ba51a549e1b1d0886c0ff.exedescription pid process Token: SeDebugPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: 33 4612 00134d170f4ba51a549e1b1d0886c0ff.exe Token: SeIncBasePriorityPrivilege 4612 00134d170f4ba51a549e1b1d0886c0ff.exe