Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 04:55
Behavioral task
behavioral1
Sample
065c00f3aff6a5e1b42362695fbe4bd6.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
065c00f3aff6a5e1b42362695fbe4bd6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
065c00f3aff6a5e1b42362695fbe4bd6.exe
-
Size
18KB
-
MD5
065c00f3aff6a5e1b42362695fbe4bd6
-
SHA1
2072ce6018b7d6529ad1c9f3feaca17252f05c89
-
SHA256
3e5252f1ce6a312b3936eca79518a4098d781eb164a2788711cbbefeaf739ac0
-
SHA512
816a6b635026c5a7dd28029a59deba5a62a6d780be2979aa39c63a5bb48d4910abc320e599d38c0a021652b23574c6dbed1468562890674b5149a1697a88864f
-
SSDEEP
384:k1F7IHvENB+LVgI0G14kKCzaNJawcudoD7U4vTA:k3cve+qI0G14/CmnbcuyD7U4k
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2260-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-1-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-2-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-3-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-4-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-5-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-6-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-7-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-8-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-9-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-10-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-12-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-13-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/2260-14-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: 33 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe Token: SeIncBasePriorityPrivilege 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe 2260 065c00f3aff6a5e1b42362695fbe4bd6.exe