Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2023 07:37
Static task
static1
Behavioral task
behavioral1
Sample
f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe
Resource
win10v2004-20231020-en
General
-
Target
f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe
-
Size
8.4MB
-
MD5
918b39a88c3d2680950a4150531f593d
-
SHA1
2568db13ed56cee70d95582cb26fd64204488c8a
-
SHA256
f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522
-
SHA512
10bcdce47227b6b6dc8bd5fafa23524393f0dfeb7fa6fe22e39aff093db99fc7cd7ada5b64a0003ef3aac7da8131ceed03a15d9434cabf7e3e6937c94f7af9aa
-
SSDEEP
49152:jcX2xDrf+2Lrb/TYvO90d7HjmAFd4A64nsfJirvtwXSh6aWXW7xkTovzw/V5AsYa:7tAYfDAsYM1EfcQYeqBWkG9yFHsyMrY
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4616 f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe Token: SeShutdownPrivilege 4616 f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4360 4616 f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe 86 PID 4616 wrote to memory of 4360 4616 f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe"C:\Users\Admin\AppData\Local\Temp\f5c620d5e3d2dfaaeb9208d58f12978233334cea42df69766f79c43b71f01522.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\cmd.execmd ver2⤵PID:4360
-