Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2023 20:48
Behavioral task
behavioral1
Sample
c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe
-
Size
1.9MB
-
MD5
4d2e543af8a08081382dfc1172399538
-
SHA1
3102b982b8f2baba0291963dcd56b79d696a4e3d
-
SHA256
c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4
-
SHA512
6c0ea9a82ed651bc582ae60e70399c2ecfc44a834b4ab71b1eebe6e9ea4f415a7b27a929e37f09b687973f7d0e8af1bea1a75cb856de533886c0a0fbe548fc91
-
SSDEEP
49152:U7gmLRegEdJScgtyOyUO5/DKpFXT5Xm9Bn1w4:U7vC+y7EpFD5S17
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe Token: SeDebugPrivilege 1216 c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe"C:\Users\Admin\AppData\Local\Temp\c9b4a769c7d70a33fba8b23126a27a04c22c88ea0e449343407a236c0cf3beb4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216