Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 05:05
Behavioral task
behavioral1
Sample
eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe
Resource
win7-20231023-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe
Resource
win10v2004-20231025-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe
-
Size
1.8MB
-
MD5
689e033dc6da36b1e7d3e8bc87171077
-
SHA1
1659965d99c93dabeb027b50846f727553603dff
-
SHA256
eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec
-
SHA512
93399e916c157bc91398d12f38d144e6dc348f61a820bb4ec4aaefe993cf11fce23b6db993f03e6a04e2cfffeed4f3e974e79b05f9ad2d0401646a2248940630
-
SSDEEP
49152:UZsDO7NPNqxfhX+kacpAkFcaXzk7i4hSj:U97Nlox+kNPFcaki4s
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2584-0-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-2-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-3-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-4-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-5-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-6-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-7-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-8-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-9-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-10-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-11-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-12-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-13-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-14-0x0000000000400000-0x0000000000C48000-memory.dmp upx behavioral2/memory/2584-15-0x0000000000400000-0x0000000000C48000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: 33 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe Token: SeIncBasePriorityPrivilege 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe 2584 eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe"C:\Users\Admin\AppData\Local\Temp\eb487f3b2790d95dee8c4aa3d2a687e2c2ec4edc9980370cc9d685c49d7ad5ec.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2584