Analysis
-
max time kernel
150s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 19:44
Behavioral task
behavioral1
Sample
2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe
Resource
win7-20241010-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe
-
Size
1.6MB
-
MD5
e37350792d0e30465520ff654cf12004
-
SHA1
d4d9d315376000fa14f720c46be6382ef17fc15e
-
SHA256
2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c
-
SHA512
d76a4bfac4435fe38102c66a8c8f15b78751be620ede36439064b49589c64d846cfbe07b8cf60b3cf5412eb04dfbdc38b4fc77c2bab919d99b4fae08c55ba023
-
SSDEEP
24576:TN0/zI3y1WV0BKWor3OnU5wixa/SjFyawx4QDSVXT5X081:q83zSYWYOe8/SJ1E4lXT5XF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe"C:\Users\Admin\AppData\Local\Temp\2f13540b51b4726a44d1c304d3c1146388a17fd8a0703d9130ac9c02a134365c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804