Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
03-12-2023 16:30
Behavioral task
behavioral1
Sample
489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe
Resource
win7-20231130-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe
Resource
win10v2004-20231130-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe
-
Size
1.2MB
-
MD5
9ec767a667edf2534f2d4940d7b7d754
-
SHA1
f51893f8a080dbc7d6ff1625182b833ac060240f
-
SHA256
489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a
-
SHA512
031693a4d6f112d6c57839161f79e25d19870e4be6568baa885ee257745db4539093ccd7b9aa8a081591a0068918843356b8c6daa6b46ba6c9a6918f9992d9e1
-
SSDEEP
24576:wJWSxIVgmzVnE9pQE/5+vlj24J+yamDSVXT5XLKf:pQIJz5EvQE/5GV+1rXT5XI
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exepid process 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exedescription pid process Token: SeDebugPrivilege 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe Token: SeDebugPrivilege 2052 489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe"C:\Users\Admin\AppData\Local\Temp\489585b74bb5641e973a786782e9f02e976aa1f9695e40dbb206632f0b8dcc0a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052