Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 03:59
Behavioral task
behavioral1
Sample
14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe
Resource
win10v2004-20250129-en
General
-
Target
14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe
-
Size
1.4MB
-
MD5
559502a0c8fca38723a0b285d2c7d617
-
SHA1
798b6876d00a3df83a0db275953b69262b990138
-
SHA256
14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd
-
SHA512
33e0203c9e8b25eff3229a8c1854ec759ddeb4d26bfcb7ebcea55dd82d4cdd25e32ccee860279cc92ca4d5fe20726c0d24d0be188cfdfbc057c9f49de2d100d1
-
SSDEEP
24576:++NXDnJ3P1BtHrVRtm3Aqa7HYdxTQt7zkpbJ7vDSKuSb9:zJ39TLV+3zNQuV74S5
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe Token: SeDebugPrivilege 4544 14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe"C:\Users\Admin\AppData\Local\Temp\14d5cb8407ddff7641a008f93e9a3a61860076441429e98b0eba6ce8805c02cd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5100ad43a6e39d44013fad7f3aa343e3b
SHA1dc8050bdee8a74354cb4a2057e4e703e7a460943
SHA256a7b15ee77dd0db946e7fdbf574889bd30c23fa3d7bff6d509df118595ee14ec5
SHA51220f9b26416804f917d0642d35de32ccae0849c34bff4eb75c6450b1ee83756f3275850101d7482eb59c78356b1489c2d4db6cd95ae9b72b64d5eeab700d36ba8