Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2023 01:38
Behavioral task
behavioral1
Sample
65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe
Resource
win7-20231023-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe
-
Size
1.9MB
-
MD5
c6592c5ee0ad6a22f1ae6a1758c48fc9
-
SHA1
4aa8903d2e37db1a7eccaf6c1a40d025c00f49aa
-
SHA256
65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4
-
SHA512
259acb48cf1a0ff8311f9bac479ac08a6932df9b0a4dfef2eb547ae78194e6b024b4a8a1dcac1cd23266a71c3169460d4ecdd9743d23b5920ccaaa820200fa6d
-
SSDEEP
49152:epa78/piiXYjvwTvi3LqUesDYrl3q/w77mPIy/nXT5XS/1:kxXBq/+8D5C/1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe Token: SeDebugPrivilege 4664 65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe"C:\Users\Admin\AppData\Local\Temp\65b31435a72b07967435dabdd20a5cb4a4656786b4bcb73569e52734300efce4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664