Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2023 05:40
Behavioral task
behavioral1
Sample
f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe
-
Size
1.7MB
-
MD5
3224b5edcdfe55694b1c549ed30e2ad3
-
SHA1
6b2b117fddd23c6f605e3ad754f4ae3da633d971
-
SHA256
f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb
-
SHA512
e82a79053fd3edd2c95eec68273d1e3520eae09349a44ab2ec6ae2c43f52c97a5aa019fea63cff7940973380ded71567fbe4344e04b5ace7778930a1e9ae85d8
-
SSDEEP
49152:fuUFwxp8xuu2oDbwEIa4Gv6YcvTJqD1XT5Xa1:D0SwEIVXYcvTJgD5K1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exepid process 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exedescription pid process Token: SeDebugPrivilege 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe Token: SeDebugPrivilege 1260 f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe"C:\Users\Admin\AppData\Local\Temp\f3384c016c7f0b1379e66a43c7383224d285f04c3e23aa3d74e34a195c4fbccb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260