Analysis
-
max time kernel
140s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 10:34
Static task
static1
Behavioral task
behavioral1
Sample
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe
Resource
win10v2004-20230915-en
General
-
Target
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe
-
Size
63KB
-
MD5
cd47b64e420b472464001891ff312ff6
-
SHA1
e39162573378dd9233495ff0a6ac0542de039efb
-
SHA256
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df
-
SHA512
09471e053cc40cb83dab4c000b0f2f26abb16e420db325c1ee11288a9a181123fb37d458c406dbfb603795b84bceca6fff908e2d7c360eb6ee61959330326467
-
SSDEEP
768:UCEWXVsHowBr6/ulopYqfAvMeRMxhtiG/joxvxkOVvw3kJ28eG5x5+8ZiHwkgcGJ:UCfOH8GlSK4ZigjonNJ42ZiQkVI
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exepid process 4456 732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exedescription pid process Token: SeDebugPrivilege 4456 732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe"C:\Users\Admin\AppData\Local\Temp\732ba957311e662ad12d7a11cfb649842eb17098a7ba83d31a315fc0d53460df.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456