Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1884ad3f22aed9798895ea97db874a01.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1884ad3f22aed9798895ea97db874a01.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1884ad3f22aed9798895ea97db874a01.exe
-
Size
488KB
-
MD5
1884ad3f22aed9798895ea97db874a01
-
SHA1
b88a28ddbce555922053f49568f060e2876894b8
-
SHA256
96f964d3d875219c62db09de389a74ca0e62a5b30e27c215903ef970b3084c11
-
SHA512
cee4622157381ebb81a774786e0291727401fc5c7cf6c66dc608f8f827f356f54edd4de34b9f3afe8453e220d297d310594e4a82a2bc3c3a6aad09f06d5e33c6
-
SSDEEP
12288:FytbV3kSoXaLnToslW9xypoeuP3mVSX6X60XWj4LaV0wcY:Eb5kSYaLTVlW9V1Pl6TG8GVvcY
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3008 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 756 1884ad3f22aed9798895ea97db874a01.exe 756 1884ad3f22aed9798895ea97db874a01.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 756 1884ad3f22aed9798895ea97db874a01.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 2972 756 1884ad3f22aed9798895ea97db874a01.exe 87 PID 756 wrote to memory of 2972 756 1884ad3f22aed9798895ea97db874a01.exe 87 PID 2972 wrote to memory of 3008 2972 cmd.exe 89 PID 2972 wrote to memory of 3008 2972 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\1884ad3f22aed9798895ea97db874a01.exe"C:\Users\Admin\AppData\Local\Temp\1884ad3f22aed9798895ea97db874a01.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1884ad3f22aed9798895ea97db874a01.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3008
-
-