Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 23:52
Behavioral task
behavioral1
Sample
6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe
-
Size
1.4MB
-
MD5
d8f1edbfcd472bd5e1aae4ae6a42cad7
-
SHA1
dc277f071e765c32bd7a2f41924d33204c9dad92
-
SHA256
6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346
-
SHA512
c928b5861635bd368ce65cd95f4882132048838bfa31fe13344ce3efd235c91566b49a9d0541d27dfc36f85f0fb63decd3591e383f14280f509bfe3cde2d8bf6
-
SSDEEP
24576:8tFS4j1cVPdZ8bBHeNxfMCrMhvHyZkno8DSdAqKWbJ70:eriVabB+NeCANRofV70
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe"C:\Users\Admin\AppData\Local\Temp\6ddc66028a9d39add11cc285d11c9c05d277a906bb2847d2b106fb1a5e846346.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220