Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2023 00:57
Behavioral task
behavioral1
Sample
5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe
-
Size
1.3MB
-
MD5
1a814eda224a37c5f933af8f0aedd7f7
-
SHA1
7310607b4751013cfc205bc5f24e64d43c9f2ded
-
SHA256
5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d
-
SHA512
d96c0c1e1d91e65c41f8bb74328b7e3862d9e6a9241e9be573fe07a9780ad971b359e71897a7113b83238b63118a3716f1d2e31a18d639b6615cd401f4038213
-
SSDEEP
24576:uUv1YsdCeJKdesyFb1KUQAZQlvEurZ7skBDSVXT5Xcdzi2ya:NvKsdCeJK4syFbI4UvEurlsJXT5XOziY
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe Token: SeDebugPrivilege 4420 5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe"C:\Users\Admin\AppData\Local\Temp\5bfa8081ff640d1caf4c1c0752ad013d315c182699c73ce271d914a2434d8e7d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420