Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 08:56
Behavioral task
behavioral1
Sample
cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe
Resource
win7-20231020-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe
Resource
win10v2004-20231020-en
4 signatures
150 seconds
General
-
Target
cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe
-
Size
1.3MB
-
MD5
fe2d0989754b4c5d260baf8bd7709a06
-
SHA1
647c55f93442b4320a602093c8fb131355dbcd97
-
SHA256
cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81
-
SHA512
2b35ed4807d3664f64931c990422c8ee0518799336f7b6ebf10e53cdb0e290046806a0c7032b63543c9eea5ae9d510ad8392464dff144b6ac3ba5dff4a73aee0
-
SSDEEP
24576:IQSmTva82UrQ5/lwx5+mNUmJRydAteEnHqxA593tL:1Smn4l1aUmSuP
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/60-0-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-2-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-3-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-4-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-5-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-6-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-7-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-8-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-9-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-10-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-11-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-12-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-13-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-14-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-15-0x0000000000400000-0x0000000000A85000-memory.dmp upx behavioral2/memory/60-16-0x0000000000400000-0x0000000000A85000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: 33 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe Token: SeIncBasePriorityPrivilege 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe 60 cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe"C:\Users\Admin\AppData\Local\Temp\cf05063004bcc8eada68e69b23e53342471c8ed37a968e32402bc019ad419a81.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:60