Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 04:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
88856db21284ea0bacb20a544600815c.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
88856db21284ea0bacb20a544600815c.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
88856db21284ea0bacb20a544600815c.exe
-
Size
41KB
-
MD5
88856db21284ea0bacb20a544600815c
-
SHA1
448a29d32fff9318769e37c5288a92bdb1042eb4
-
SHA256
a5a0f1d816d082a07ad590df584d0960e8fa70db87926edc8b15050936a9f367
-
SHA512
b9053a45036c6e57035a71d5c89d2b81f4d5f10e10fc9e282f69ad98f90514559e08997e0a41c5a941c0848c10ff34b3f4540eec358d1cde4b7d8ba7f61d4a71
-
SSDEEP
768:Bgme9GwyIpR6GBzIbc61Gl3jbgIVEeXNz6j5QntXr8sYX8:BFe94UdBUbj1yTnXNO5MtXI
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe 2384 88856db21284ea0bacb20a544600815c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2384 88856db21284ea0bacb20a544600815c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2384 wrote to memory of 608 2384 88856db21284ea0bacb20a544600815c.exe 3 PID 2384 wrote to memory of 608 2384 88856db21284ea0bacb20a544600815c.exe 3 PID 2384 wrote to memory of 608 2384 88856db21284ea0bacb20a544600815c.exe 3 PID 2384 wrote to memory of 608 2384 88856db21284ea0bacb20a544600815c.exe 3 PID 2384 wrote to memory of 608 2384 88856db21284ea0bacb20a544600815c.exe 3 PID 2384 wrote to memory of 608 2384 88856db21284ea0bacb20a544600815c.exe 3 PID 2384 wrote to memory of 660 2384 88856db21284ea0bacb20a544600815c.exe 1 PID 2384 wrote to memory of 660 2384 88856db21284ea0bacb20a544600815c.exe 1 PID 2384 wrote to memory of 660 2384 88856db21284ea0bacb20a544600815c.exe 1 PID 2384 wrote to memory of 660 2384 88856db21284ea0bacb20a544600815c.exe 1 PID 2384 wrote to memory of 660 2384 88856db21284ea0bacb20a544600815c.exe 1 PID 2384 wrote to memory of 660 2384 88856db21284ea0bacb20a544600815c.exe 1 PID 2384 wrote to memory of 772 2384 88856db21284ea0bacb20a544600815c.exe 8 PID 2384 wrote to memory of 772 2384 88856db21284ea0bacb20a544600815c.exe 8 PID 2384 wrote to memory of 772 2384 88856db21284ea0bacb20a544600815c.exe 8 PID 2384 wrote to memory of 772 2384 88856db21284ea0bacb20a544600815c.exe 8 PID 2384 wrote to memory of 772 2384 88856db21284ea0bacb20a544600815c.exe 8 PID 2384 wrote to memory of 772 2384 88856db21284ea0bacb20a544600815c.exe 8 PID 2384 wrote to memory of 788 2384 88856db21284ea0bacb20a544600815c.exe 82 PID 2384 wrote to memory of 788 2384 88856db21284ea0bacb20a544600815c.exe 82 PID 2384 wrote to memory of 788 2384 88856db21284ea0bacb20a544600815c.exe 82 PID 2384 wrote to memory of 788 2384 88856db21284ea0bacb20a544600815c.exe 82 PID 2384 wrote to memory of 788 2384 88856db21284ea0bacb20a544600815c.exe 82 PID 2384 wrote to memory of 788 2384 88856db21284ea0bacb20a544600815c.exe 82 PID 2384 wrote to memory of 792 2384 88856db21284ea0bacb20a544600815c.exe 81 PID 2384 wrote to memory of 792 2384 88856db21284ea0bacb20a544600815c.exe 81 PID 2384 wrote to memory of 792 2384 88856db21284ea0bacb20a544600815c.exe 81 PID 2384 wrote to memory of 792 2384 88856db21284ea0bacb20a544600815c.exe 81 PID 2384 wrote to memory of 792 2384 88856db21284ea0bacb20a544600815c.exe 81 PID 2384 wrote to memory of 792 2384 88856db21284ea0bacb20a544600815c.exe 81 PID 2384 wrote to memory of 900 2384 88856db21284ea0bacb20a544600815c.exe 80 PID 2384 wrote to memory of 900 2384 88856db21284ea0bacb20a544600815c.exe 80 PID 2384 wrote to memory of 900 2384 88856db21284ea0bacb20a544600815c.exe 80 PID 2384 wrote to memory of 900 2384 88856db21284ea0bacb20a544600815c.exe 80 PID 2384 wrote to memory of 900 2384 88856db21284ea0bacb20a544600815c.exe 80 PID 2384 wrote to memory of 900 2384 88856db21284ea0bacb20a544600815c.exe 80 PID 2384 wrote to memory of 944 2384 88856db21284ea0bacb20a544600815c.exe 79 PID 2384 wrote to memory of 944 2384 88856db21284ea0bacb20a544600815c.exe 79 PID 2384 wrote to memory of 944 2384 88856db21284ea0bacb20a544600815c.exe 79 PID 2384 wrote to memory of 944 2384 88856db21284ea0bacb20a544600815c.exe 79 PID 2384 wrote to memory of 944 2384 88856db21284ea0bacb20a544600815c.exe 79 PID 2384 wrote to memory of 944 2384 88856db21284ea0bacb20a544600815c.exe 79 PID 2384 wrote to memory of 316 2384 88856db21284ea0bacb20a544600815c.exe 9 PID 2384 wrote to memory of 316 2384 88856db21284ea0bacb20a544600815c.exe 9 PID 2384 wrote to memory of 316 2384 88856db21284ea0bacb20a544600815c.exe 9 PID 2384 wrote to memory of 316 2384 88856db21284ea0bacb20a544600815c.exe 9 PID 2384 wrote to memory of 316 2384 88856db21284ea0bacb20a544600815c.exe 9 PID 2384 wrote to memory of 316 2384 88856db21284ea0bacb20a544600815c.exe 9 PID 2384 wrote to memory of 396 2384 88856db21284ea0bacb20a544600815c.exe 78 PID 2384 wrote to memory of 396 2384 88856db21284ea0bacb20a544600815c.exe 78 PID 2384 wrote to memory of 396 2384 88856db21284ea0bacb20a544600815c.exe 78 PID 2384 wrote to memory of 396 2384 88856db21284ea0bacb20a544600815c.exe 78 PID 2384 wrote to memory of 396 2384 88856db21284ea0bacb20a544600815c.exe 78 PID 2384 wrote to memory of 396 2384 88856db21284ea0bacb20a544600815c.exe 78 PID 2384 wrote to memory of 412 2384 88856db21284ea0bacb20a544600815c.exe 77 PID 2384 wrote to memory of 412 2384 88856db21284ea0bacb20a544600815c.exe 77 PID 2384 wrote to memory of 412 2384 88856db21284ea0bacb20a544600815c.exe 77 PID 2384 wrote to memory of 412 2384 88856db21284ea0bacb20a544600815c.exe 77 PID 2384 wrote to memory of 412 2384 88856db21284ea0bacb20a544600815c.exe 77 PID 2384 wrote to memory of 412 2384 88856db21284ea0bacb20a544600815c.exe 77 PID 2384 wrote to memory of 516 2384 88856db21284ea0bacb20a544600815c.exe 76 PID 2384 wrote to memory of 516 2384 88856db21284ea0bacb20a544600815c.exe 76 PID 2384 wrote to memory of 516 2384 88856db21284ea0bacb20a544600815c.exe 76 PID 2384 wrote to memory of 516 2384 88856db21284ea0bacb20a544600815c.exe 76
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:660
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:316
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:772
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3856
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4072
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4240
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:1348
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2264
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1160
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:2260
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4208
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:760
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3956
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3152
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2012
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4508
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4968
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3488
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\88856db21284ea0bacb20a544600815c.exe"C:\Users\Admin\AppData\Local\Temp\88856db21284ea0bacb20a544600815c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2868
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2824
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2556
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2280
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2172
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1984
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1764
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1720
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1656
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1120
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788