Analysis
-
max time kernel
5s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1cab09ca8dce443e0391ee36c43a6c1c.exe
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1cab09ca8dce443e0391ee36c43a6c1c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
1cab09ca8dce443e0391ee36c43a6c1c.exe
-
Size
1.6MB
-
MD5
1cab09ca8dce443e0391ee36c43a6c1c
-
SHA1
a6d6697442160e5623fac37bcfd7f1e1d242d3d9
-
SHA256
444aaf2ad423151a5b1ee03b1d451c1c105dbc8265cef1dabfcf6fb2bb83d47a
-
SHA512
a3402adf480983a31671ac2fc1988c365b1b9d093132f704e846cf98a4f43fbdbeb59fcdc292bcc0e61f6f820057b97faf8fa0c2735f06649946d1d0d7d18a33
-
SSDEEP
24576:5KYd9ifgHFI+X7b71ei6Q5MpHPylXLBdGFj4GNysBm6wr9nAK2XRXy4GAmzCwx:hpHFI+XpexQ5CHPCrGJZiURNG9
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeSecurityPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeTakeOwnershipPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeLoadDriverPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeSystemProfilePrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeSystemtimePrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeProfSingleProcessPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeIncBasePriorityPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeCreatePagefilePrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeBackupPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeRestorePrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeShutdownPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeDebugPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeSystemEnvironmentPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeRemoteShutdownPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeUndockPrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: SeManageVolumePrivilege 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: 33 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: 34 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: 35 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe Token: 36 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe 3816 1cab09ca8dce443e0391ee36c43a6c1c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cab09ca8dce443e0391ee36c43a6c1c.exe"C:\Users\Admin\AppData\Local\Temp\1cab09ca8dce443e0391ee36c43a6c1c.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3816