Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 09:26
Behavioral task
behavioral1
Sample
e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe
Resource
win7-20241010-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe
-
Size
1.4MB
-
MD5
ae5fe2ebb48eb1af88fa17dafa9e8db9
-
SHA1
53e7f111ddc0563b00d888099136363f7fb0cca3
-
SHA256
e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357
-
SHA512
db2cd06536f04d27914bc07c5e19d9cc7559df0e2113460518def854ba96da98a2a340064fb444643d2c6310a25c3e27016cca22d0185affeb8c1d03b928f024
-
SSDEEP
24576:/0uKmWwKeZpFkJNC25Z9+a2QdkfTzxCy+d2czxMWIbJ73DSK+qhl:1vGeXks2J+a2Q6zxCyuNzxMnV7F+Kl
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 400 e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe"C:\Users\Admin\AppData\Local\Temp\e0184edff7e74b1824ac707f96e5d01caca32559793a57c1da29482302301357.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400