Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-04-2023 01:00
Static task
static1
Behavioral task
behavioral1
Sample
33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe
Resource
win10v2004-20230220-en
General
-
Target
33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe
-
Size
62KB
-
MD5
09a29f3b529c5e9ab25a47973bb0900a
-
SHA1
b8dce851d01dbe0335f11fa8449b52a2270776e6
-
SHA256
33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a
-
SHA512
35e92a26fc392b15eb7fd78ca1f6a6c08afe42ed535fd020237215d7f4db0f66fa0676eb70d646f8790c9724c30c605a99b33cf6a6c84c3de78f6061f1a48efb
-
SSDEEP
1536:s2JbaiIZApuLzOgkx9MbEze4g3ViceSITKdU:dbahZApuL1kx9MbEze4g3ViceYO
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exepid process 1700 33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exedescription pid process Token: SeDebugPrivilege 1700 33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe"C:\Users\Admin\AppData\Local\Temp\33035a718f5445742b82707f0ba6aff80337cac1e89b6b3b8b51177c7f9f578a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken