Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 05:24
Behavioral task
behavioral1
Sample
xf-adsk64.exe
Resource
win7-20230831-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
xf-adsk64.exe
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
xf-adsk64.exe
-
Size
305KB
-
MD5
f02e53b18532dd9df02034c6205c9e91
-
SHA1
bc7f6756e76faf672ed4c176b2dfc2cede7dc8ca
-
SHA256
caf61dcb26cdf721f752bdeea949d936914f5e632b9ac99e2d23371489f326ce
-
SHA512
471021e77c84b000fe3b5c11931696526fd1e11a42649a4f8a33b6aa69d02e80210dacaff14b730e7ae147933533ddab40de69665ecd04549dbab4cfb842018d
-
SSDEEP
6144:Yh6/KxWBnsIifLmGihpbEGWb2t0AXk1S/USLvC11MbSjWoSk:Yh6FspDmGihmGh0gk3av3bJoSk
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3356-0-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-1-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-2-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-3-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-4-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-5-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-6-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-7-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-8-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-9-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-10-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-11-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-12-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-13-0x0000000000400000-0x000000000052A000-memory.dmp upx behavioral2/memory/3356-14-0x0000000000400000-0x000000000052A000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4972 AUDIODG.EXE