Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 03:04
Behavioral task
behavioral1
Sample
b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe
Resource
win10v2004-20250314-en
2 signatures
150 seconds
General
-
Target
b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe
-
Size
1.4MB
-
MD5
645f1525857da646d74b2911ce50638c
-
SHA1
99bade72bafb8a62bc001b1b08846da902ad9b30
-
SHA256
b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040
-
SHA512
3052ec28dc4c8ff7392e712c543a69299144b935685acd492f51af25f50a574a29849e8dcfc39f9c066226500f1700766eeedcc508222a5de31f8504e195f54a
-
SSDEEP
24576:YlIFWm3UdC7AVOnrl/6aucZnCDFrNTDSDx+yaB:7k1VqB6yZnSf1B
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3460 b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe"C:\Users\Admin\AppData\Local\Temp\b41c755f8b423e6534ee7228da3ae9d244f83dd2e13b90114bc75bacceeb1040.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460