Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2023 01:02
Behavioral task
behavioral1
Sample
6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe
Resource
win7-20231023-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe
-
Size
1.7MB
-
MD5
c1e81cc755e3f35fe4f56d2672638404
-
SHA1
44550e282e60fb58b21df6f752ab73b3742f496f
-
SHA256
6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e
-
SHA512
8c22d31142bac99dce5c93d62aa05e606980b3a433271dfdfc2d295a0d64f81347e7c3db7b341c20cdf18e299d06ec53915a1ed5226803a13922738ee25d23f2
-
SSDEEP
49152:cU0W9+rQgGtHXOQz+XI9kx4eEyhInBXT5Xr1:Haqh+XT4eJhInBD5b1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe Token: SeDebugPrivilege 208 6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe"C:\Users\Admin\AppData\Local\Temp\6dc073f9270b23ebf7221ca43ec3167b6665b9393d9746cfc69d40123a66b90e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208