Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16/02/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
yuzu_install.exe
Resource
win7-20220901-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
yuzu_install.exe
Resource
win10v2004-20221111-en
25 signatures
150 seconds
General
-
Target
yuzu_install.exe
-
Size
10.3MB
-
MD5
d51d1d2718e3b9eb5651398e61d74327
-
SHA1
296f84b6c276fe9e91651336de83d3377ffa147b
-
SHA256
9e894c2620d565949e0d71e181e780ddaccc5b0d2fd70ec674e913ac7549fdcf
-
SHA512
a5cb4c437ec8a6a7b036c5e4acd9317b5348851b867069e5da0cc1e887a6b29e33e4d0f6c34a55ed1fc9786bd03a6ae39c95df3ae5f0eb41ab66972d38400063
-
SSDEEP
98304:9Ap0k+ZEtzkBIDW3TFCdsnCDyXOJWvO1pD5i4By2moI3YxkTN1JItXiy+HD:9w3dtDW30jygH7i4fI3YxkZqLy
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 680 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 680 AUDIODG.EXE Token: 33 680 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 680 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\yuzu_install.exe"C:\Users\Admin\AppData\Local\Temp\yuzu_install.exe"1⤵PID:1140
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5741⤵
- Suspicious use of AdjustPrivilegeToken
PID:680