Analysis
-
max time kernel
147s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 10:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e077213e83d7f93f19822232a914b6a.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e077213e83d7f93f19822232a914b6a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0e077213e83d7f93f19822232a914b6a.exe
-
Size
488KB
-
MD5
0e077213e83d7f93f19822232a914b6a
-
SHA1
9d1c30e9659f83c6a83fdb5d0365e2e960b74337
-
SHA256
b2b25d7050351549bf2f7e17e3a7c7550740bf78188e3d73e7db82db59d997dd
-
SHA512
6fe823ca8470cfd68db40cf3a55cd42b27b5e92fac6a73543fd60d38e7d21c75f6fcdf2883da5f7cf8001d524fb19f83801fc700b4389bb10cde6eacae3a5643
-
SSDEEP
12288:FytbV3kSoXaLnToslYpae7DUpEYPYr9GeOC:Eb5kSYaLTVle7YqYgrpb
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2484 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3168 0e077213e83d7f93f19822232a914b6a.exe 3168 0e077213e83d7f93f19822232a914b6a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3168 0e077213e83d7f93f19822232a914b6a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4660 3168 0e077213e83d7f93f19822232a914b6a.exe 87 PID 3168 wrote to memory of 4660 3168 0e077213e83d7f93f19822232a914b6a.exe 87 PID 4660 wrote to memory of 2484 4660 cmd.exe 89 PID 4660 wrote to memory of 2484 4660 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e077213e83d7f93f19822232a914b6a.exe"C:\Users\Admin\AppData\Local\Temp\0e077213e83d7f93f19822232a914b6a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0e077213e83d7f93f19822232a914b6a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2484
-
-