Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 03:47
Behavioral task
behavioral1
Sample
be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe
Resource
win7-20240729-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe
Resource
win10v2004-20250129-en
2 signatures
150 seconds
General
-
Target
be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe
-
Size
1.2MB
-
MD5
ce5771a05838b46f9b4c1ac4bb4341c2
-
SHA1
2400814d1fe48c257c11613f46344ce934985afc
-
SHA256
be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007
-
SHA512
fb8cac689bfd846fd423919f102a70ab6eaf4d0555b7d30bb728ab979e7801623767c2d84181e195136e3943fbc998920e75bc55f2908695b2bbb87d84c23ec8
-
SSDEEP
24576:wJWSxIVgmzVnE9pQE/5+vlj24J+yamDSVXT5XLKfE:pQIJz5EvQE/5GV+1rXT5XIE
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe Token: SeDebugPrivilege 3664 be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe"C:\Users\Admin\AppData\Local\Temp\be965fe5394355fed4788cba0c4ca5e1f2a39e1dfc7838265d2d486da9e25007.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664