Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 09:53
Behavioral task
behavioral1
Sample
04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe
-
Size
657KB
-
MD5
5c4f2e8a882ce2811c417141bf5b7960
-
SHA1
9756baff0fd6e3098914b7b59966370c2262425d
-
SHA256
04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269
-
SHA512
10ae930117619c7b412576a23dbcccd78ab5dd1183e4ecbb176521366baa5e4d303eeb030497acbea08db72640a60f65ef858493d7e305fd311fbf7a839bfe8c
-
SSDEEP
12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5u/h:iZ1xuVVjfFoynPaVBUR8f+kN10Et
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeSecurityPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeTakeOwnershipPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeLoadDriverPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeSystemProfilePrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeSystemtimePrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeProfSingleProcessPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeIncBasePriorityPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeCreatePagefilePrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeBackupPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeRestorePrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeShutdownPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeDebugPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeSystemEnvironmentPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeChangeNotifyPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeRemoteShutdownPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeUndockPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeManageVolumePrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeImpersonatePrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: SeCreateGlobalPrivilege 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: 33 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: 34 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: 35 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe Token: 36 1316 04eada400e4e663564b94a01c096643788f6fc11406b4841c24d356ac14b1269.exe