Analysis
-
max time kernel
162s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2023 20:45
Behavioral task
behavioral1
Sample
96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe
-
Size
1.7MB
-
MD5
993798628494c23a129f0bd023be5058
-
SHA1
af763090d8557dbfbd85f239855e1141584d1eea
-
SHA256
96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827
-
SHA512
efc748cec81104fed1961ff3f420cba021fa704d2c06f503a31fa92e17d955bdd597e1e51c8c4b28ffa7d3cc570d4a1added303001005ee0ac8a826a918a965f
-
SSDEEP
24576:z9VjzsJgFzdQuyG7lQVvKO5rien7cMa9+rzHRDSVXT5XaUPFsNya3:z9ZzVzDyGeVvKO5rie7Xrz2XT5XAN1
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe Token: SeDebugPrivilege 4808 96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe"C:\Users\Admin\AppData\Local\Temp\96b632f7461d9813b1381f8d6ffb03c6f179ba5e8883b7bea2f11f6399d94827.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808