Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 09:04
Behavioral task
behavioral1
Sample
87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe
Resource
win7-20230712-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe
-
Size
1.6MB
-
MD5
90a2da428260f7d223c15a648addd630
-
SHA1
05e02c67b2985b2f50b6a080a483c855082ea8ab
-
SHA256
87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27
-
SHA512
ff54afbbd9ef9c40a5d12ec066d4d26c9a381887d1bc9fdce7b1e332a14fad23cd57e4fe93af64eb45b01a5901cff5a587deea3d78d3a01401480ef603eb0778
-
SSDEEP
49152:8GlYwBkqMsX8EZKh+n711kLXT5Xx3ogN1:/sqZCwkLD5B3oS1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe Token: SeDebugPrivilege 4412 87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe"C:\Users\Admin\AppData\Local\Temp\87cd4ceff42a87166065e064e8bf943fda13676c6352b2e41798475e44dedf27.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412