Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2023 22:37
Static task
static1
Behavioral task
behavioral1
Sample
49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe
Resource
win10v2004-20230915-en
General
-
Target
49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe
-
Size
2.0MB
-
MD5
1f34db7db0f586c2b5f1d30bee7555b3
-
SHA1
6f1ba92ec790af15d4fa092916d8abba2538ca4a
-
SHA256
49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25
-
SHA512
e7228f266705ae8c56a0c7c6f826ee7836bc7078cf6539d3ac239881aa7f4ee786e2ee5825907f6506c74fb8773676a493e31a951e45ae5eb313a9d46974ba85
-
SSDEEP
49152:BvMO9IP3R9Pd4ZJrqfzXUQxN3D5xnpDXZ8G9:T9wvPd4vrqfVxNXpjZL9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 1 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeCreateTokenPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeAssignPrimaryTokenPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeLockMemoryPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeIncreaseQuotaPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeMachineAccountPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeTcbPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeSecurityPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeTakeOwnershipPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeLoadDriverPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeSystemProfilePrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeSystemtimePrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeProfSingleProcessPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeIncBasePriorityPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeCreatePagefilePrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeCreatePermanentPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeBackupPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeRestorePrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeShutdownPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeDebugPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeAuditPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeSystemEnvironmentPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeChangeNotifyPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeRemoteShutdownPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeUndockPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeSyncAgentPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeEnableDelegationPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeManageVolumePrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeImpersonatePrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeCreateGlobalPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 31 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 32 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 33 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 34 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 35 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 36 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 37 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 38 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 39 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 40 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 41 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 42 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 43 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 44 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 45 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 46 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 47 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: 48 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeDebugPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe Token: SeDebugPrivilege 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe 4332 49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe"C:\Users\Admin\AppData\Local\Temp\49a301d239766e18cd1b4790a3e5b814b2f63adb211b87325edebdbb4f1e7d25.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4332