Analysis
-
max time kernel
45s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 20:56
Static task
static1
Behavioral task
behavioral1
Sample
abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe
Resource
win10v2004-20220901-en
General
-
Target
abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe
-
Size
346KB
-
MD5
e6da3252d890d7741a1ddefcb3bb72ab
-
SHA1
b0a630cf4a7b0544aa4ea5488684c319278eca5c
-
SHA256
abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081
-
SHA512
e360b06f961e867919273231492f484500ad108d8fe0983abf63fa9ccb147d1d387e31b16e1fc9356d2c2fb154bb331897e2c93112a4ae6a471e1e581e0c96da
-
SSDEEP
6144:OJTsMHNA7mPRRVGWMIovhaeS/e4eXvBNK4uFm87452vBQxw1C:AfA7KfVGWyae06W4G7nvUw
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exepid process 844 abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exedescription pid process Token: SeDebugPrivilege 844 abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe"C:\Users\Admin\AppData\Local\Temp\abd4bc45bfb6a99dcd16909ef1f70c6529e416a2e52583db291a2e3445fcf081.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844