Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 06:42
Behavioral task
behavioral1
Sample
bdee664e38f1d4e08dc5f5de66d61327.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
bdee664e38f1d4e08dc5f5de66d61327.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
bdee664e38f1d4e08dc5f5de66d61327.exe
-
Size
11KB
-
MD5
bdee664e38f1d4e08dc5f5de66d61327
-
SHA1
2f6d54f5e3a7ced5b341df818a99103b119de20b
-
SHA256
cf7e073c7ba58d7af160d3428beaa574a25a5511955fdb847413bfe4544f93cd
-
SHA512
f31197344b2fb4fce766c60211a228d0fbdbd72fbc9151a252d4babe5aa7f203fe076265dd99caee8cd88d22b986209dff0827293160cab87346933f867634f5
-
SSDEEP
192:BDxgSgQYJLI4jkJn8oXPZk4lXnQwh8mluUniUJ5WhaCflolMsmN2WTE0:BeSgdxDkR8URk4XQy8mlu0OlolMB2K
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2452-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2452-1-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe 2452 bdee664e38f1d4e08dc5f5de66d61327.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2452 bdee664e38f1d4e08dc5f5de66d61327.exe