Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2023 19:44
Behavioral task
behavioral1
Sample
58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe
-
Size
1.9MB
-
MD5
9440b67e62f9c2a631ed1ffcd4481397
-
SHA1
16b946d7efbe05eaacc3e0d30d27751631c0bb8d
-
SHA256
58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a
-
SHA512
fa33fa593d86a235d430e45195f60d089e8620f8b743534e1cdb40feb662d6de067a5e2b1d06e56198f1e5a15aad1e52506a5deb97ca383de81ab6d0cb703144
-
SSDEEP
49152:R1x9qEJDOcVvEnMtS44r774ud24NC5XT5XS31:jDOcBEnQMr7MI2aC5D5C31
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe Token: SeDebugPrivilege 3908 58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe"C:\Users\Admin\AppData\Local\Temp\58d0cda7efb9fcde2f7ecf81c8d2b79420720c9e1e2c8a69c41bb9343a141f6a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908