Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2023 16:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SWFTMT1038146735PDF.exe
Resource
win7-20231025-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
SWFTMT1038146735PDF.exe
Resource
win10v2004-20231127-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
SWFTMT1038146735PDF.exe
-
Size
696KB
-
MD5
eae5575afd765d679ea1a05bb4baae43
-
SHA1
7cdbf3550b3ecda84b1ece2beff680a2e5cc6e5b
-
SHA256
5c0379a54fc0effe3a56e4d5fb623f8ac3e711da65434d7a22f9fa7e55758460
-
SHA512
d45b4adad7fc31e74e0e187311276d2fdcd95988c5a57bb4a4fadf79a22f4ddba395af643d5612686112ccd17e33482ce7c9bff4835aeee7fdf75df027041a9c
-
SSDEEP
12288:9ll5nF8bVdqrlb/9W0ri8DKYxT5buy8R0BNyQ+lvcjAsxyRr7wvh:7luqhb06DKYV5CTR0BgQ6XSyuJ
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
SWFTMT1038146735PDF.exepid process 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe 4760 SWFTMT1038146735PDF.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SWFTMT1038146735PDF.exedescription pid process Token: SeDebugPrivilege 4760 SWFTMT1038146735PDF.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
SWFTMT1038146735PDF.exedescription pid process target process PID 4760 wrote to memory of 4396 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 4396 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 4396 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 5108 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 5108 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 5108 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 4392 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 4392 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 4392 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 268 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 268 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 268 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 1864 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 1864 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe PID 4760 wrote to memory of 1864 4760 SWFTMT1038146735PDF.exe SWFTMT1038146735PDF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"2⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"2⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"2⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"2⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"C:\Users\Admin\AppData\Local\Temp\SWFTMT1038146735PDF.exe"2⤵PID:5108