Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 05:32
Behavioral task
behavioral1
Sample
3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe
Resource
win10v2004-20231222-en
General
-
Target
3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe
-
Size
1.7MB
-
MD5
72b44cef3ca9e963a44cfee93e45cf4c
-
SHA1
abc8bc760da44aa9a29c43100cd8fb259545d9ae
-
SHA256
3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df
-
SHA512
4c4a3d84a432a048c2f869f9ed14020ccbe4b671cba25d8ad5af4a5ab51ef7c71a9f2cc0d60c72413e81dde7b7d4df9d51d30f3d07bc8a34c01ef336f595165b
-
SSDEEP
24576:DaxVmg8EApbtayDPnJV7fa+S3laZDRvkHwfXSOg9xk2e6OzXEDSVXT5XcDUN0Ps1:DajFaAlGRvkQfXSLp47JXT5Xck0Ps1
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3784 3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe"C:\Users\Admin\AppData\Local\Temp\3414d7a3897b3c525c1c00f53607e9e664f7b389790bde12e5f99905284404df.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784