Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 00:24
Static task
static1
Behavioral task
behavioral1
Sample
5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe
Resource
win7-20220901-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
3 signatures
150 seconds
Errors
Reason
Reading agent response: read tcp 10.127.0.1:55022->10.127.0.14:8000: read: connection reset by peer
General
-
Target
5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe
-
Size
3KB
-
MD5
b6f8e8be6a63fe1c2339e75eab35edae
-
SHA1
8f09e6ccc320f8589e589540a8dc63a415565a9c
-
SHA256
5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292
-
SHA512
cf136cd8a2b06dd34c6e917b44132f5bff540abe269b11da0dee9074a97bcf967cd13903a831d3229b6a11c71f6ffc4ef6975a56c1e8c2a95fbc89e999f1ff3c
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1376 5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe Token: SeRemoteShutdownPrivilege 1376 5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe"C:\Users\Admin\AppData\Local\Temp\5a90ecec7838f4ce4eb74a17afce45fac797ca31fc5f1ff0edb10101bb03e292.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1296