Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe
Resource
win10v2004-20240802-en
General
-
Target
ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe
-
Size
24.4MB
-
MD5
a2409ced4e462f3a09540fc3f9bc2c72
-
SHA1
9b87fc0e83dfb069170cb8e4fda8e5dac36fa458
-
SHA256
ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817
-
SHA512
07f4a9bc4b5cb4d72dc9dddd8965a94556d3c97fa6bd9a2f1cf2bddc54b83768acdc8ebcdca1ee774702c5cb80cc2e2d898c98764a16697b898488a5bbb5c498
-
SSDEEP
393216:0T0WwBrLtviphyCNYsB0a6/PRGTUJO/klUROsvsZdZJMZ:0Iviphy0yD/PkTUmw4vwdfMZ
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exepid process 2780 ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe 2780 ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe 2780 ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exedescription pid process Token: SeShutdownPrivilege 2780 ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe"C:\Users\Admin\AppData\Local\Temp\ee5e15f0a5d97e1c50e1b74e2856852979d7018e559635d2dd2bf93504cd0817.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780