Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 06:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ce1bb5a3217868ebd6398b007b7ae570N.exe
Resource
win7-20240903-en
3 signatures
120 seconds
Behavioral task
behavioral2
Sample
ce1bb5a3217868ebd6398b007b7ae570N.exe
Resource
win10v2004-20240802-en
2 signatures
120 seconds
General
-
Target
ce1bb5a3217868ebd6398b007b7ae570N.exe
-
Size
55KB
-
MD5
ce1bb5a3217868ebd6398b007b7ae570
-
SHA1
05e479491cbcf31b36cd19752444cfa75fcbf64e
-
SHA256
5dabc1175011c6033a80b70d93a1cdd6dfc2b984be671079a2c3f9516e85aba7
-
SHA512
ebb44f4af2c7d88655cffc6a14f53bc046367c2affc8a10263a159d54a4c358190652c1d6bea46cd4377b628482581a64374d68e9b9d7c89ed67779f9d90e38f
-
SSDEEP
768:xuJJfqbfZNv+tpRSbPq2bnOyC+JvIKV5Cr+u+H9l7a69qVLq/1A6cVPUTe/Zq:xu/mfZp+yLqHsgKj7u+Hja69qYA7Zq
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4388 ce1bb5a3217868ebd6398b007b7ae570N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4660 4388 ce1bb5a3217868ebd6398b007b7ae570N.exe 83 PID 4388 wrote to memory of 4660 4388 ce1bb5a3217868ebd6398b007b7ae570N.exe 83 PID 4388 wrote to memory of 4544 4388 ce1bb5a3217868ebd6398b007b7ae570N.exe 84 PID 4388 wrote to memory of 4544 4388 ce1bb5a3217868ebd6398b007b7ae570N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce1bb5a3217868ebd6398b007b7ae570N.exe"C:\Users\Admin\AppData\Local\Temp\ce1bb5a3217868ebd6398b007b7ae570N.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\ce1bb5a3217868ebd6398b007b7ae570N.exeC:\Users\Admin\AppData\Local\Temp\ce1bb5a3217868ebd6398b007b7ae570N.exe2⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\ce1bb5a3217868ebd6398b007b7ae570N.exeC:\Users\Admin\AppData\Local\Temp\ce1bb5a3217868ebd6398b007b7ae570N.exe2⤵PID:4544
-