Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
4978cfcab326102f72f09d9b84653242.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4978cfcab326102f72f09d9b84653242.exe
Resource
win10v2004-20231222-en
General
-
Target
4978cfcab326102f72f09d9b84653242.exe
-
Size
22KB
-
MD5
4978cfcab326102f72f09d9b84653242
-
SHA1
521f85c237bd5489bfe031cd909625fed4fd2ed3
-
SHA256
dae94d07dbdcd16b1bdd1ecae608c1beb3492c38662de00fc1eeae8c897725b4
-
SHA512
8a4401d724fa67febd3d454c2684673f0b8a08c7ed40923e1ab32947e697945deceac5cba28262596820279a406c3d3304c6c84d9052eb0dd8384f24e2cbebf4
-
SSDEEP
384:ColuhmnCxYWh7h/VjVCmIZkCMGD2xZVqc9YYuRFasc1LBn7Vn0yO+18XSU6WjzWY:cSM7h/VyTZax7q+YRFs1lJp18XSU6UYU
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\f35ee9e.drv 4978cfcab326102f72f09d9b84653242.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 696 4978cfcab326102f72f09d9b84653242.exe 696 4978cfcab326102f72f09d9b84653242.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe Token: SeDebugPrivilege 696 4978cfcab326102f72f09d9b84653242.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4978cfcab326102f72f09d9b84653242.exe"C:\Users\Admin\AppData\Local\Temp\4978cfcab326102f72f09d9b84653242.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4978CF~1.EXE >> NUL2⤵PID:3904
-