Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 16:48
Behavioral task
behavioral1
Sample
319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe
Resource
win7-20240729-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe
-
Size
1.9MB
-
MD5
c443e409cc75c33361aa5ca8c9d11237
-
SHA1
6e481f890bd6426942175964154432a7d366637d
-
SHA256
319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4
-
SHA512
55de826859d528529c2c2b9a61858b3ad1d5e2d4927f9c9f3b0615222049b30419eca426fdebd5f47d48a7698e30cd69b879640ae67962236546fc076fd55b5b
-
SSDEEP
49152:Wgil3OghBQ0xbWXqjvd/+wNg9cMpbigrXT5Xeza1w4m:lQ2qjDg9cMNigrD5/17m
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe Token: SeDebugPrivilege 4328 319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe"C:\Users\Admin\AppData\Local\Temp\319f926dc3fbe7a9ee93abe82e75d5864bccc9b216fe79c2745058d2884bd5d4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328