Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 14:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
56a9ddcc62d69fc68263462a91e25484.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
56a9ddcc62d69fc68263462a91e25484.exe
Resource
win10v2004-20231222-en
3 signatures
150 seconds
General
-
Target
56a9ddcc62d69fc68263462a91e25484.exe
-
Size
77KB
-
MD5
56a9ddcc62d69fc68263462a91e25484
-
SHA1
ff45d2625bd87dd5d6912d53dd8fdca0e232eab1
-
SHA256
878964b82920aa63a2a9d5932829573d914b8dc34e0c8385795860a67c4017af
-
SHA512
8c5007a2d49fa538ca1d05fd48dbbc10a946a204fa42873694c3be1585d50a9074bb409fd0746114d63e0ea8918fd5968cd99615407cef54b12cdedefcdfc858
-
SSDEEP
1536:STcVnsI3pe2JhuWTcvZjvE6NvUqhMAETKe6o6DgORCCpELaPHN:S4dM2uYco6NvU1AETKNo6DgOx
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4236 CbEvtSvc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\CbEvtSvc.exe 56a9ddcc62d69fc68263462a91e25484.exe File opened for modification C:\Windows\SysWOW64\CbEvtSvc.exe 56a9ddcc62d69fc68263462a91e25484.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4716 56a9ddcc62d69fc68263462a91e25484.exe Token: SeLoadDriverPrivilege 4236 CbEvtSvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a9ddcc62d69fc68263462a91e25484.exe"C:\Users\Admin\AppData\Local\Temp\56a9ddcc62d69fc68263462a91e25484.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
C:\Windows\SysWOW64\CbEvtSvc.exeC:\Windows\SysWOW64\CbEvtSvc.exe -k netsvcs1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236