Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2023 16:17
Behavioral task
behavioral1
Sample
2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe
-
Size
1.9MB
-
MD5
acfdec4c2f46243919e0dcaeb226f10b
-
SHA1
ad3cd9c3bd0dea2903ab01afa9c8f3b513a73175
-
SHA256
2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848
-
SHA512
447367c9346898c62aeb246383febcd45f3d22c6001f81a4460ece82d72b7515f6bdbeb5510308cc4744ced8e9573bfe195e4bed756781a64945f92572c1771f
-
SSDEEP
49152:2DycVRqImDU84THsbHWvTcs+EfoR9ztZe+E7uAUXT5X81:O78ptZNTD5s1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe Token: SeDebugPrivilege 644 2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe"C:\Users\Admin\AppData\Local\Temp\2d520801f3db4b2010c714168e894b104b3129fafd6fc25eea817692ccee1848.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:644