Analysis
-
max time kernel
145s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 00:34
Behavioral task
behavioral1
Sample
46bf042e06c7e2f0f803253888d19eb9.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
46bf042e06c7e2f0f803253888d19eb9.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
46bf042e06c7e2f0f803253888d19eb9.exe
-
Size
196KB
-
MD5
46bf042e06c7e2f0f803253888d19eb9
-
SHA1
8cc89b31f957a890eee5779a30ca8544c4d1b712
-
SHA256
e4bb401a0a87f470e9d1e5a77276ea50009b48e4db97dab2150c3e2192077c8c
-
SHA512
b0449dd49cfdb3539b4d8ac050ac56f172c49b90ebcf045cbd76ff512c892ce9e6a4057ba3f255bc540549356813032595f27fca12250f23ead8b43c4f81d677
-
SSDEEP
3072:NU+nlydvJP3WjnN9Kiexg4wvEXIweQ0VJdYJXEbG2XFKyQs3scDDjdDwTVQwGPz9:NUolydFynZ/+43KNsJP+TVabkBC77jaE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3944-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/memory/3944-1-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/memory/3944-2-0x0000000000400000-0x000000000047E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\taskmng.exe 46bf042e06c7e2f0f803253888d19eb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 3944 46bf042e06c7e2f0f803253888d19eb9.exe Token: SeIncBasePriorityPrivilege 3944 46bf042e06c7e2f0f803253888d19eb9.exe Token: 33 3944 46bf042e06c7e2f0f803253888d19eb9.exe Token: SeIncBasePriorityPrivilege 3944 46bf042e06c7e2f0f803253888d19eb9.exe Token: 33 3944 46bf042e06c7e2f0f803253888d19eb9.exe Token: SeIncBasePriorityPrivilege 3944 46bf042e06c7e2f0f803253888d19eb9.exe