Analysis
-
max time kernel
136s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
60a40e093c9474cc257f1532814bcb29.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
60a40e093c9474cc257f1532814bcb29.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
60a40e093c9474cc257f1532814bcb29.exe
-
Size
316KB
-
MD5
60a40e093c9474cc257f1532814bcb29
-
SHA1
8c5cbed52077abd6d0109a88a2aa3af098e75697
-
SHA256
3edccd1e7c2054a623982b5e391eb804ec99b2ce7c07839a83fb09718e714af8
-
SHA512
0f18575dac62036d0139543d5e0c40b16441aae5b1d9e5d08b546078a8cb8896d5bb4fddbf626dc894723ab0cb28c97dff391208232f76b59ae12a36137a2e2e
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEueZPNj1pys:FytbV3kSoXaLnTosl1Elxpr
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1204 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1260 60a40e093c9474cc257f1532814bcb29.exe 1260 60a40e093c9474cc257f1532814bcb29.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1260 60a40e093c9474cc257f1532814bcb29.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2052 1260 60a40e093c9474cc257f1532814bcb29.exe 50 PID 1260 wrote to memory of 2052 1260 60a40e093c9474cc257f1532814bcb29.exe 50 PID 2052 wrote to memory of 1204 2052 cmd.exe 68 PID 2052 wrote to memory of 1204 2052 cmd.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\60a40e093c9474cc257f1532814bcb29.exe"C:\Users\Admin\AppData\Local\Temp\60a40e093c9474cc257f1532814bcb29.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\60a40e093c9474cc257f1532814bcb29.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1204
-
-