Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 03:20
Behavioral task
behavioral1
Sample
c045a0feb21965b697ce7c6abcf68d94.exe
Resource
win7-20240704-en
windows7-x64
14 signatures
150 seconds
General
-
Target
c045a0feb21965b697ce7c6abcf68d94.exe
-
Size
8.0MB
-
MD5
c045a0feb21965b697ce7c6abcf68d94
-
SHA1
bd60e3aa141a2ed4dbb11313be29fadc9fb50b6a
-
SHA256
2a068fd9cec974e59a74ab132f781f9c69cb5b620e562f05d514d7720752ae64
-
SHA512
013661d73b8140304a8578b9d903e9192aed82ce1dc244065284a5ae5ed83482e23a302dd164243959468bbd2b124e1b892373737f9c95ad85aba699159be20a
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4TNXVBoOJBiPHaIJtM1ub8e1m6i:joZtL+EP8xXVBoOJBiPHaIJtMEA
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral2/memory/1968-0-0x00000187BF070000-0x00000187BF0B0000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 c045a0feb21965b697ce7c6abcf68d94.exe