Analysis
-
max time kernel
184s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 15:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0484aa000f07c2884c31013323ebc4a9.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0484aa000f07c2884c31013323ebc4a9.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0484aa000f07c2884c31013323ebc4a9.exe
-
Size
813KB
-
MD5
0484aa000f07c2884c31013323ebc4a9
-
SHA1
ce61b85ad0ed012547aecc4a4c23cff391a5f233
-
SHA256
dccabce2f1cefa0cf743f2bff25cabf281bf2737c401444759574596bb7b7de9
-
SHA512
c3736186d3c48731ccc0624ffec55e19ba141926228bd0399ba566e8f69de83ac6c04e1e86d5d30dff63c6f388fcf8b6c4d253804bfd295100788d1c234077b3
-
SSDEEP
12288:9EDCJJDXb8qWvvMyesvleMkWzChpBTfgYvVHcgwSuLfKtTegIyp:9mQGbvNvjkJPKu+lvrg3
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe 3148 0484aa000f07c2884c31013323ebc4a9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3148 0484aa000f07c2884c31013323ebc4a9.exe