Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/10/2023, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe
Resource
win10v2004-20231020-en
General
-
Target
22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe
-
Size
1.9MB
-
MD5
767868fee3a36a28c727d1ecab5b2e4e
-
SHA1
cda5d02cb0eddddb7e279bfb4a622c79d9f73e3b
-
SHA256
22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9
-
SHA512
923a02d4f26b474ea3892c546e56dbc808c27f8087901ea203ec7ad64a37bc52fe75878ff614e52b8e4f252682cc3b32bba7e38febabe84380e7cce61d014ea4
-
SSDEEP
24576:4Ow/dS8VklPA4hD4kSf7w00u91QmtNiReC2SFJNoQsbd/plKYtl+dLk40Q51RHeM:4nSHwl1yRe3QTuhpL+UQoM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2044-8-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-7-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-9-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-12-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-14-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-10-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-16-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-18-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-20-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-23-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-25-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-27-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-30-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-32-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-34-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-36-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-38-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-40-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-42-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-44-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-46-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-48-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-51-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-54-0x0000000002620000-0x000000000265E000-memory.dmp upx behavioral2/memory/2044-59-0x0000000002620000-0x000000000265E000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 1 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeCreateTokenPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeAssignPrimaryTokenPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeLockMemoryPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeIncreaseQuotaPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeMachineAccountPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeTcbPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeSecurityPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeTakeOwnershipPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeLoadDriverPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeSystemProfilePrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeSystemtimePrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeProfSingleProcessPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeIncBasePriorityPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeCreatePagefilePrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeCreatePermanentPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeBackupPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeRestorePrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeShutdownPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeDebugPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeAuditPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeSystemEnvironmentPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeChangeNotifyPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeRemoteShutdownPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeUndockPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeSyncAgentPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeEnableDelegationPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeManageVolumePrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeImpersonatePrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: SeCreateGlobalPrivilege 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 31 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 32 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 33 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 34 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 35 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 36 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 37 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 38 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 39 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 40 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 41 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 42 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 43 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 44 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 45 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 46 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 47 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe Token: 48 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe 2044 22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe"C:\Users\Admin\AppData\Local\Temp\22af4203fd46ecc676a63fc75dccda479df1c53b9b1b4e009102fb4071b70dc9.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2044