Analysis
-
max time kernel
166s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 09:19
Behavioral task
behavioral1
Sample
3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe
-
Size
647KB
-
MD5
695ff58a026a54442f96f601354a3852
-
SHA1
a34c4eb14eade78cfbc65b5d599f70ff8775431a
-
SHA256
3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d
-
SHA512
a806d20f1eec0ec90def5e9c82dff3b0d4529eb9f03af38e3db7621cffe1b71482a55771f3cfaf7b772ae25b83c5d555928d242b1a78d1134ed35533a04854bb
-
SSDEEP
12288:46A84PaHhfD/tV9sj5NKR0pau9XGyu2qBVGLQyTPfham:9AmBpVKHu0Mu9Xo20VGLVP5am
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSecurityPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeTakeOwnershipPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeLoadDriverPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSystemProfilePrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSystemtimePrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeProfSingleProcessPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeIncBasePriorityPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeCreatePagefilePrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeBackupPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeRestorePrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeShutdownPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeDebugPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeSystemEnvironmentPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeChangeNotifyPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeRemoteShutdownPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeUndockPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeManageVolumePrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeImpersonatePrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: SeCreateGlobalPrivilege 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 33 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 34 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 35 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe Token: 36 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4224 3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe"C:\Users\Admin\AppData\Local\Temp\3e3b9752770fcab0efde418210dafa9de7f23f0764b8c5bd1ebc2cbcbfa5243d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4224