Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16-10-2022 10:48
Static task
static1
Behavioral task
behavioral1
Sample
d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe
Resource
win7-20220901-en
windows7-x64
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe
Resource
win10-20220812-en
windows10-1703-x64
3 signatures
300 seconds
General
-
Target
d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe
-
Size
3.6MB
-
MD5
f75e24392be4fd2a7a056f8cc7fcd6ec
-
SHA1
88767643eaef4708951daa2ed380f18f655f8ce7
-
SHA256
d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66
-
SHA512
c0e16d14a9d02bf7d4d594032f80aadc2ab7d02d11e4ebe2999ac3f1f79516f99f899d61835fdc6a7ba29700081526057e2bdc34dd71c74af975180df0f0f413
-
SSDEEP
98304:USN8txi1dCG+zA2rUti51pRpPzRpDp7V:bQI10A2KE1pRVzX1V
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1000 d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe 1000 d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1000 d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe"C:\Users\Admin\AppData\Local\Temp\d2fbe9f3097af501b3bc8b9738a66e44a45028dbc8cf78024320ba9464c06c66.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000