Analysis
-
max time kernel
70s -
max time network
502s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe
Resource
win10v2004-20221111-en
General
-
Target
bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe
-
Size
189KB
-
MD5
da1d7f6e210dd2d4b37a79f46af1bb70
-
SHA1
86fb81be69f40a858f8d7095794c1c44f93ba51c
-
SHA256
bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3
-
SHA512
a99fd6a2ed37571db785d4bd9a78e79edc95baefc44e83c3cb65684a26fe6731ab897b0f6e24ca3df59d8c462db365119df2a720d433fb344c75d7c5f5de3cba
-
SSDEEP
1536:ez8mVOBJwnVuRrDiaLZmKSxoeCVIvL+ZNys1KJs:1Jwn8VDiOHSieCVIvLkyta
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe Token: SeDebugPrivilege 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74 PID 4456 wrote to memory of 1268 4456 bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe"C:\Users\Admin\AppData\Local\Temp\bd8041dbb13850ff49bafbab68bfa153da5ab9bc936cf0d3c737e9340a75dde3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1268
-