Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 12:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
258b3eaf8356f81d5b3679845a42850a.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
258b3eaf8356f81d5b3679845a42850a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
258b3eaf8356f81d5b3679845a42850a.exe
-
Size
316KB
-
MD5
258b3eaf8356f81d5b3679845a42850a
-
SHA1
e0971f9698d4212b60f6bd302e98e8868c2d9797
-
SHA256
d98c93936a7eb9008dd6ec1b7addc12cd28bba806a5386bf5c3f35f6b6275607
-
SHA512
2962fd4b9034200243a1ea9d5414afbd92ba991bb52b647f14b9c6cfc752a8b7c362fb2872c5ca18d880bf85b3f233a2d94fdcd58444317cb33339cb0f209abe
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEmJNQp3KzuJtJ:FytbV3kSoXaLnToslLNQp3
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1636 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 258b3eaf8356f81d5b3679845a42850a.exe 2484 258b3eaf8356f81d5b3679845a42850a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 258b3eaf8356f81d5b3679845a42850a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 5064 2484 258b3eaf8356f81d5b3679845a42850a.exe 90 PID 2484 wrote to memory of 5064 2484 258b3eaf8356f81d5b3679845a42850a.exe 90 PID 5064 wrote to memory of 1636 5064 cmd.exe 92 PID 5064 wrote to memory of 1636 5064 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\258b3eaf8356f81d5b3679845a42850a.exe"C:\Users\Admin\AppData\Local\Temp\258b3eaf8356f81d5b3679845a42850a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\258b3eaf8356f81d5b3679845a42850a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1636
-
-