Analysis
-
max time kernel
150s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 16:48
Behavioral task
behavioral1
Sample
2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe
-
Size
1.3MB
-
MD5
0dde3afe295713e917639377a0e53bcd
-
SHA1
905e83054670b257f46258b9020dd9cb7f897904
-
SHA256
2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc
-
SHA512
aa67f61e6ae368d6c731e3544f9e72287facb3816adfce11c070bf74c924ec8da2682d50916cf688817fe6d9c3f20a1e65dc52fbc7d0925badd8b3f804552c94
-
SSDEEP
24576:sihBpD2IfKHpnvOhmXdRw5S79JiBALC26/9P9RDSpH+HbJ7S:9iDHNvsmt3qmLC26/59I+HV7S
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe"C:\Users\Admin\AppData\Local\Temp\2b2f4f5b7a18f60dfe935ef37934fcfd136408138009121130bcba40ce259bfc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172