Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
Resource
win10v2004-20240508-en
General
-
Target
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
-
Size
12KB
-
MD5
73a82f11b119b3b68161c385d3b21ce1
-
SHA1
3022ea9d1fb93fba84ae31bfcd843c48baaa89a2
-
SHA256
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115
-
SHA512
fa2f67642930dc534360d0c5ab8294d7bfef22dd9332e72d74017130c0cb26ae25b5b0dd528d9d545e440ddaa4a9f61392d13189168978a10394aaadbe20a2cb
-
SSDEEP
192:RFBkm/S1R0XLQeFwUxifpoVGxcMR8DdkTYfJMULz9MQ1d:NB/HblJ0+Vq3uaoyA9M
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exepid process 4632 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exedescription pid process Token: SeDebugPrivilege 4632 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe Token: SeDebugPrivilege 5112 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exedescription pid process target process PID 4632 wrote to memory of 5112 4632 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe PID 4632 wrote to memory of 5112 4632 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe PID 4632 wrote to memory of 5112 4632 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe"C:\Users\Admin\AppData\Local\Temp\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\ProgramData\pcdfdata\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exeC:\ProgramData\pcdfdata\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5112