Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 02:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3b9d9e66d57cf6d9005297708549b169.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b9d9e66d57cf6d9005297708549b169.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
3b9d9e66d57cf6d9005297708549b169.exe
-
Size
17KB
-
MD5
3b9d9e66d57cf6d9005297708549b169
-
SHA1
1e050f439a2e05d3f82a6d0372e86aea4360f59f
-
SHA256
eafe0d80cfb6b3ef1c9b3e310b47a2a1ce74209cf6ef204495c01c0fcc5f79f6
-
SHA512
0d961c0d5a6f1011cf2de7e0eff62cae6a839d066b7979cfe352f45c711a90b4d5e94cd98a3975325e8a49f323679e93d308c99ff70e621ecda24e1a85f21322
-
SSDEEP
384:dFL8+iiMePz/stRgsy0N4+v0qA7KvdkHq:dt8riMeYty0Nl67K1X
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4748 3b9d9e66d57cf6d9005297708549b169.exe 4748 3b9d9e66d57cf6d9005297708549b169.exe 4748 3b9d9e66d57cf6d9005297708549b169.exe 4748 3b9d9e66d57cf6d9005297708549b169.exe 4748 3b9d9e66d57cf6d9005297708549b169.exe 4748 3b9d9e66d57cf6d9005297708549b169.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4748 3b9d9e66d57cf6d9005297708549b169.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 2000 4748 3b9d9e66d57cf6d9005297708549b169.exe 17 PID 4748 wrote to memory of 2000 4748 3b9d9e66d57cf6d9005297708549b169.exe 17 PID 4748 wrote to memory of 2000 4748 3b9d9e66d57cf6d9005297708549b169.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b9d9e66d57cf6d9005297708549b169.exe"C:\Users\Admin\AppData\Local\Temp\3b9d9e66d57cf6d9005297708549b169.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\3B9D9E~1.EXE > nul2⤵PID:2000
-