Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 10:26
Behavioral task
behavioral1
Sample
48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe
-
Size
10.2MB
-
MD5
e7a395f3d6e3d5b38e927864d7783495
-
SHA1
b40cc6dae9760986c4824b801e8532a1bbbeb6aa
-
SHA256
48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833
-
SHA512
b891c91e8a6b49beaf952d59c63c49bac178622a857a747336fdf0a83c5ebca263466246831d2ab83302d5d1758684647546d4f1d20738eaaf22ff5714c19c11
-
SSDEEP
196608:fKlHKom3MAM3hYdjAGm82ZKElZdpecJJqUi5loF9xtMjX2WO2urVu9HlNcE6H:ClqomlMxkcGmNcEZpeO4Ui5loF9/OPxy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3356-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3356-15-0x0000000010000000-0x000000001003E000-memory.dmp upx -
resource yara_rule behavioral2/memory/3356-7-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-54-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-55-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-56-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-57-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-58-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-59-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-60-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-61-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-62-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-63-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-64-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-65-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-66-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-67-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-68-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-69-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-70-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-71-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-72-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-73-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-74-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-75-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-76-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-77-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-78-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-79-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-80-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-81-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-82-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-83-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-84-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-85-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-86-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-87-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-88-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect behavioral2/memory/3356-89-0x0000000000400000-0x0000000001A4E000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4920 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4920 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe 3356 48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe"C:\Users\Admin\AppData\Local\Temp\48dd32091d8fe37fdf7708b6d3ffafc583d04578a6baed7b8cf6e31b78270833.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3356
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x4f01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4920