Analysis
-
max time kernel
52s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe
Resource
win10v2004-20240508-en
General
-
Target
120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe
-
Size
388KB
-
MD5
ac2a8f1e5f9388d8302aa1ddf5f73b4b
-
SHA1
e9d620f665352634ea436123edfdf3c943ce1679
-
SHA256
120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f
-
SHA512
9df749e88cad340773b43ffbf2cd5ceb6e37bc49d2251742281bdcc6e63aba9cf9a195b06a43b9be3ca71570bf7e71052ccc2f9f2c18c2a0645a35af986df1da
-
SSDEEP
12288:y24wfDpRquuVqPl42hqKQMYX+/9JcJl8R4wgDpRquuVqPl42hqKQiY:y2hDpRquuVqPl42xQTX+/3ql8RCDpRqr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3028 120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe 3028 120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe 3028 120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe 3028 120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe"C:\Users\Admin\AppData\Local\Temp\120c782dadc03839dc8673e56c8ce277c2d40c06f86867ad7a52deff3d5fb79f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3028