Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
116ec00fc16c0fbb2d8c8d7811952555.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
116ec00fc16c0fbb2d8c8d7811952555.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
116ec00fc16c0fbb2d8c8d7811952555.exe
-
Size
316KB
-
MD5
116ec00fc16c0fbb2d8c8d7811952555
-
SHA1
40d8bffdc8e036b7ab475b1d622f9b32c2f54a90
-
SHA256
01b368c92dd84243875f84cd7e852d0f445d07d52a943f015448da6f0509d7c2
-
SHA512
0dac108d76dd6540d2b092b25252657cf6f46fcc02a2601dc529111a4ff4bb732d8c6cd29ac442b7d7a24b9e1d2b2344f9779713bc72cc89573eac509c5f6d38
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEWeAIs3zhObo:FytbV3kSoXaLnTosldobo
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1996 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 116ec00fc16c0fbb2d8c8d7811952555.exe 2944 116ec00fc16c0fbb2d8c8d7811952555.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2944 116ec00fc16c0fbb2d8c8d7811952555.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3588 2944 116ec00fc16c0fbb2d8c8d7811952555.exe 87 PID 2944 wrote to memory of 3588 2944 116ec00fc16c0fbb2d8c8d7811952555.exe 87 PID 3588 wrote to memory of 1996 3588 cmd.exe 89 PID 3588 wrote to memory of 1996 3588 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\116ec00fc16c0fbb2d8c8d7811952555.exe"C:\Users\Admin\AppData\Local\Temp\116ec00fc16c0fbb2d8c8d7811952555.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\116ec00fc16c0fbb2d8c8d7811952555.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1996
-
-