Analysis
-
max time kernel
142s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 02:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe
-
Size
4.0MB
-
MD5
2787dca209bb8518f06289ce73388b58
-
SHA1
f42dd9ebf3430eb961ed11ff9a8a277257512e01
-
SHA256
8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300
-
SHA512
f0128ed08fd8245651feef17faf1ead891e24478cd63eacfae60b70f613933c34dc3d6d8edcc9fb7358483fd1f6ee62a50af40b61d443c9b65ea906c8bd1bce4
-
SSDEEP
98304:suK46h3h8xwcohniTy9vq8FwXqruMl11Z:u0ytwXqrj
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 1 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeCreateTokenPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeAssignPrimaryTokenPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeLockMemoryPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeIncreaseQuotaPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeMachineAccountPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeTcbPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeSecurityPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeTakeOwnershipPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeLoadDriverPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeSystemProfilePrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeSystemtimePrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeProfSingleProcessPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeIncBasePriorityPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeCreatePagefilePrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeCreatePermanentPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeBackupPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeRestorePrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeShutdownPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeDebugPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeAuditPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeSystemEnvironmentPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeChangeNotifyPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeRemoteShutdownPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeUndockPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeSyncAgentPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeEnableDelegationPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeManageVolumePrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeImpersonatePrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeCreateGlobalPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 31 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 32 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 33 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 34 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 35 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 36 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 37 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 38 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 39 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 40 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 41 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 42 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 43 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 44 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 45 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 46 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 47 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: 48 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeDebugPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe Token: SeDebugPrivilege 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe 2868 8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe"C:\Users\Admin\AppData\Local\Temp\8699fda6f4dfb0022598c7b4bcd77af2cf132c06f903490508b28aeae9f2b300.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2868