Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 16:47
Behavioral task
behavioral1
Sample
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe
Resource
win10v2004-20230831-en
3 signatures
150 seconds
General
-
Target
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe
-
Size
78KB
-
MD5
735e2ebea2304cd996ade02f9f62383a
-
SHA1
6bab8de8dea9c950b9028e02f362a4306d363cab
-
SHA256
f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8
-
SHA512
ec1544214416ff77732c49ea4fb1819840b1c3205523842b15c09749481d89a9d5d0728cf83813769c5454176cce50f3ee348160c58b6c9b3d08e91227f6e151
-
SSDEEP
1536:Uti+6Y9yhU1uDppS5wpOk3JCK6pFoRXd6fOpd/9nEh9TGWJcR:rhU1AQwpOk5CK6DO/9ESWJc
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5072 PING.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe Token: 33 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe Token: SeIncBasePriorityPrivilege 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe Token: 33 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe Token: SeIncBasePriorityPrivilege 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe Token: 33 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe Token: SeIncBasePriorityPrivilege 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 640 wrote to memory of 2632 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe 88 PID 640 wrote to memory of 2632 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe 88 PID 640 wrote to memory of 2632 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe 88 PID 640 wrote to memory of 2008 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe 90 PID 640 wrote to memory of 2008 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe 90 PID 640 wrote to memory of 2008 640 f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe 90 PID 2008 wrote to memory of 5072 2008 cmd.exe 92 PID 2008 wrote to memory of 5072 2008 cmd.exe 92 PID 2008 wrote to memory of 5072 2008 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe"C:\Users\Admin\AppData\Local\Temp\f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵PID:2632
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 0 -n 2 & del "C:\Users\Admin\AppData\Local\Temp\f44098e7eaec4cd14d896779d38b61cbeb6ee2b276eb2f9fcea26c32ad732ec8_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\PING.EXEping 0 -n 23⤵
- Runs ping.exe
PID:5072
-
-