Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 09:19
Behavioral task
behavioral1
Sample
3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe
-
Size
647KB
-
MD5
695ff58a026a54442f96f601354a3852
-
SHA1
a34c4eb14eade78cfbc65b5d599f70ff8775431a
-
SHA256
3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d
-
SHA512
a806d20f1eec0ec90def5e9c82dff3b0d4529eb9f03af38e3db7621cffe1b71482a55771f3cfaf7b772ae25b83c5d555928d242b1a78d1134ed35533a04854bb
-
SSDEEP
12288:46A84PaHhfD/tV9sj5NKR0pau9XGyu2qBVGLQyTPfham:9AmBpVKHu0Mu9Xo20VGLVP5am
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSecurityPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeTakeOwnershipPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeLoadDriverPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSystemProfilePrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSystemtimePrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeProfSingleProcessPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeIncBasePriorityPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeCreatePagefilePrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeBackupPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeRestorePrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeShutdownPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeDebugPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSystemEnvironmentPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeChangeNotifyPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeRemoteShutdownPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeUndockPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeManageVolumePrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeImpersonatePrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeCreateGlobalPrivilege 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 33 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 34 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 35 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1912 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe"C:\Users\Admin\AppData\Local\Temp\3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1912