Analysis
-
max time kernel
128s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2023, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe
Resource
win10v2004-20230703-en
General
-
Target
8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe
-
Size
3.6MB
-
MD5
3af474e6aa501f497314dbb9bf743f64
-
SHA1
08b8d858ac718f57cafa515698bf31a192083b2b
-
SHA256
8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586
-
SHA512
48a42db31e083f683594d6005654aca617cb0c5caac351a7be301d21c92cd47b11daec8975a4cd987f448932e8d68232c8e365df3097b060433f246377950573
-
SSDEEP
49152:C0LvFKFNpE4X/ctSy8/gj1jD1SGjFj3GlFETRje/TChYQwJz2HyuuVfYHtK:2N01zjFj8EQOmq0V9
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4992-141-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-140-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-142-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-143-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-145-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-147-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-149-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-151-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-153-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-155-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-157-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-159-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-162-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-164-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-166-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-168-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-170-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-172-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-174-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-176-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-178-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-180-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-182-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-184-0x0000000002680000-0x00000000026BE000-memory.dmp upx behavioral2/memory/4992-185-0x0000000002680000-0x00000000026BE000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 1 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeCreateTokenPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeAssignPrimaryTokenPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeLockMemoryPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeIncreaseQuotaPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeMachineAccountPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeTcbPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeSecurityPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeTakeOwnershipPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeLoadDriverPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeSystemProfilePrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeSystemtimePrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeProfSingleProcessPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeIncBasePriorityPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeCreatePagefilePrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeCreatePermanentPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeBackupPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeRestorePrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeShutdownPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeDebugPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeAuditPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeSystemEnvironmentPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeChangeNotifyPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeRemoteShutdownPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeUndockPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeSyncAgentPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeEnableDelegationPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeManageVolumePrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeImpersonatePrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeCreateGlobalPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 31 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 32 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 33 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 34 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 35 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 36 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 37 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 38 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 39 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 40 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 41 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 42 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 43 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 44 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 45 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 46 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 47 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: 48 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe Token: SeDebugPrivilege 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe 4992 8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe"C:\Users\Admin\AppData\Local\Temp\8a7c058551cc6d9437313ed55dcac821870fcd83c55dd18eff4f7566578e5586.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4992