Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 21:46
Behavioral task
behavioral1
Sample
46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe
-
Size
1.7MB
-
MD5
bc91a78105e69a80ff6a4b76a7f85820
-
SHA1
b03f4615125cca602e7c180321d93101e17d8c19
-
SHA256
46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f
-
SHA512
fc459e2e07040497e6f5707aae3bcf12e90b267936679f30b5040d815c0cea86b74b428bf00e5a14760f26094c6fb1f787adf56d456aac3de66c4fd66090b3cd
-
SSDEEP
24576:1QnaP+tCiiEUjkGIIWCSwGPyRIoEQpLSvsd3TDSVXT5XtqPya0:1z+tCkUjzIIWCMqRIocUdAXT5XgP10
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe Token: SeDebugPrivilege 4880 46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe"C:\Users\Admin\AppData\Local\Temp\46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880