Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 16:41
Behavioral task
behavioral1
Sample
edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe
Resource
win10v2004-20240802-en
General
-
Target
edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe
-
Size
50.9MB
-
MD5
60343d91b173d06833f4b140e350402e
-
SHA1
f860fd75d740a6e5fb8d60da3dc16937e59367c5
-
SHA256
edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626
-
SHA512
6af0679af6375214fedb36a030784aa3333265910b5cb7d2b466ee54f7442050d5ce572bbd85849627777bb7c5107280a6edbba29f4aea2f8578b88f6f52279f
-
SSDEEP
786432:vQQQQQQQQQQQQQQQbQQQQQQQQQQQQQQQqQQQQQQQ:vhhhhhhhehhhhhhhXhhh
Malware Config
Signatures
-
BlackGuard
Infostealer first seen in Late 2021.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1376 edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe"C:\Users\Admin\AppData\Local\Temp\edc045eca80f0ca41c2e4efd0e45867dc6d502b6eae18bdffb4fba96dcab1626.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376