Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe
Resource
win10v2004-20231023-en
General
-
Target
be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe
-
Size
3.2MB
-
MD5
5e6b8b4030baedd3e7c6d90566f77d39
-
SHA1
3fb10b608dd01bba8f5b79c01b0162d9791e7fe8
-
SHA256
be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868
-
SHA512
d33ab948494b2efd735729796e5d6a7bfad319dbb220d2c120f45899fcdbcb93997871db1e8c513a1af5b7d8af22ca2f331dfbec525d344d8b7c9b82d0c45dd0
-
SSDEEP
98304:PTdhsTj2f/P2WJO5U3WKtFQNX7LCz70i6p+hDpXiyNaGsFLHRq6coy96F+PVepdh:LdhsTj2f/P2WJO5U3WKtFQNX7LCz70iW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2788-1-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-0-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-3-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-2-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-5-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-17-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-25-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-29-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral2/memory/2788-46-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2788 be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe 2788 be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe 2788 be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe"C:\Users\Admin\AppData\Local\Temp\be1d16b601fe66a5a07a71ba5cfd09ed9858d8e015201d8768016320f3f47868.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2788