Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 16:58
Behavioral task
behavioral1
Sample
31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe
Resource
win7-20241023-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe
-
Size
1.6MB
-
MD5
347e7a975426fbe27238df0b282a85de
-
SHA1
1ca267d78cd653cab1696257f05e77cc2de73bb9
-
SHA256
31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410
-
SHA512
c5c647e42b2abfd7b54514b973520d88d4406e8725e1003820ea6b9999b4af397412a5d4efe7dd5653e218e14e64fcaf4818ba6b30b010b13a1d9e41ede6d2f5
-
SSDEEP
24576:r0yOdKnqj9MNrOoThmBZTsl3WaPECkDtGQjnEd7DSVXT5X1hnH:gSqj9MxOt83J/kwonPXT5X1hH
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe Token: SeDebugPrivilege 4324 31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe"C:\Users\Admin\AppData\Local\Temp\31f1b1e7a8fbcfbc8e2ed8ee89a7d4bd5829d4c7371d6cb6d372833160477410.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324