Analysis
-
max time kernel
1s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d272611f260b36b2941118305c484ae.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d272611f260b36b2941118305c484ae.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
0d272611f260b36b2941118305c484ae.exe
-
Size
3.9MB
-
MD5
0d272611f260b36b2941118305c484ae
-
SHA1
a6c000869df8194c41f4db08e237d7838de26f28
-
SHA256
c0ea651792b542e8351013eab9d1458998d9c780f8f6c2bd9012d987d6c88046
-
SHA512
02fab02e03a90bcc91fe88e56c66ab34270b9161479254f4eaa50ad6c0488a71fd200705c0f5d8658d1d97807cc99eea579ff14d5e209165ab8b701d5593164e
-
SSDEEP
98304:YOd7fTYG3193fJLBl2sMqi+ClAFNy58MXbMxB:5pX93xLxxi+xFNy5
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 0d272611f260b36b2941118305c484ae.exe 4536 0d272611f260b36b2941118305c484ae.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4536 0d272611f260b36b2941118305c484ae.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d272611f260b36b2941118305c484ae.exe"C:\Users\Admin\AppData\Local\Temp\0d272611f260b36b2941118305c484ae.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\AutoUpdateSign.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdateSign.exe" FPT.SIGN2⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\FPT.SIGN.exe"C:\Users\Admin\AppData\Local\Temp\FPT.SIGN.exe"3⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" times.ttf "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" WindowsBase.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" MetroFramework.Fonts.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" MetroFramework.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" MetroFramework.Design.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" itextsharp.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" C1.Win.C1Input.2.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" C1.Win.C1Command.2.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" C1.Win.2.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" Interop.IWshRuntimeLibrary.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sysC:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" BaoPQAP.dll "C:\Users\Admin\AppData\Local\Temp" /o+4⤵PID:4340
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 26404⤵PID:2764
-
-
-