Analysis
-
max time kernel
10s -
max time network
12s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 02:49
Behavioral task
behavioral1
Sample
5bf086fa71745542de9295a388211786.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
5bf086fa71745542de9295a388211786.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
5bf086fa71745542de9295a388211786.exe
-
Size
9KB
-
MD5
5bf086fa71745542de9295a388211786
-
SHA1
55b1cab2de38ac633d57f99c91435b4ba162f898
-
SHA256
196883d96aed6339acc146360a0fbea21a289ea1be81c7ea56ef64e429438644
-
SHA512
0e0dc3e24d6242be50c034780d1ac9a6f024fd616d68aa4f0854badfd1d44bd3640ce938a87f5c763e71ea75595700ffdcd0c84b3b5ad2d9c1ab380753f4c164
-
SSDEEP
192:rxFnHElXJ+LwqA7Zk1tgIPTtQuFitAob6iVfvOI:LHwWA7ZoZLWpn6iT
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2244-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2244-1-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2244 5bf086fa71745542de9295a388211786.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bf086fa71745542de9295a388211786.exe"C:\Users\Admin\AppData\Local\Temp\5bf086fa71745542de9295a388211786.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2816
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2504