Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 08:40
Static task
static1
Behavioral task
behavioral1
Sample
96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe
Resource
win10v2004-20230703-en
General
-
Target
96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe
-
Size
8.0MB
-
MD5
6e8568f9b88b903dd797559f17b8ac9c
-
SHA1
a5d02b5b6f52f4c664c0e29c1576db6f9927811c
-
SHA256
96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc
-
SHA512
818f6dc547c246a6e1ae05ae15caf66ddfeb9b9527ff0783dd51340a0a479fbe3394f7fcbe03501af2421a5b6e1f79e63ea5442d90d8801d81ab4b8d26bf25cc
-
SSDEEP
196608:P9GnCxosx3mWucFVAKAptnaqpp6JUxoU5GEIr2u:ZLx2cwKUaqppf53Ip
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4604 96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe 4604 96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4604 96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4828 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4828 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4604 96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe 4604 96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe"C:\Users\Admin\AppData\Local\Temp\96d0bed0105da707b70c4c8446cccadca6b601e271d4f0d61784f836b3538fdc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:4604
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4cc 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828