Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/01/2024, 18:31
Behavioral task
behavioral1
Sample
6b24b0702eac74cf3c648a0804452ebd.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
6b24b0702eac74cf3c648a0804452ebd.exe
-
Size
754KB
-
MD5
6b24b0702eac74cf3c648a0804452ebd
-
SHA1
92cf90db4bad4b4d07bc304ff2552e42e963b008
-
SHA256
8ace32100551efbaa57b98a58de7846b67769b4cf2ba70a245540157c3e2098a
-
SHA512
bc79187ea6c44c9dbb0deb07d0bf2c2951fddbc3830fdb7348da63dff40f72a569ce68855f44dd733baa0bf23ea3c31c8138eb08704e3872c04bfa2765c8a2e1
-
SSDEEP
12288:YFLlJnnbWOtz6sVJhvaz1Qc/WdI//vfM4qwrbkniafLo6vUTyl0c/qg:43nbWmJVJFwSddIXvfhqbiaxvRFq
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeSecurityPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeTakeOwnershipPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeLoadDriverPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeSystemProfilePrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeSystemtimePrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeProfSingleProcessPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeIncBasePriorityPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeCreatePagefilePrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeBackupPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeRestorePrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeShutdownPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeDebugPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeSystemEnvironmentPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeChangeNotifyPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeRemoteShutdownPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeUndockPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeManageVolumePrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeImpersonatePrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: SeCreateGlobalPrivilege 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: 33 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: 34 1940 6b24b0702eac74cf3c648a0804452ebd.exe Token: 35 1940 6b24b0702eac74cf3c648a0804452ebd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1940 6b24b0702eac74cf3c648a0804452ebd.exe