Analysis
-
max time kernel
147s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 23:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b15f78acd1fcfd0922d51e6b5f36120.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b15f78acd1fcfd0922d51e6b5f36120.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1b15f78acd1fcfd0922d51e6b5f36120.exe
-
Size
644KB
-
MD5
1b15f78acd1fcfd0922d51e6b5f36120
-
SHA1
0b659861c354b22c1f4d01e2405415566bbf7117
-
SHA256
56e65d422414cee26dd464870634423208ab32af705a177c0ffa9511292eaa29
-
SHA512
0123cc2c18ea98058263bc2f4c5c2f34804addaf631203de2fb709c400a69d1957cd78c7f87729b5c78d0bca485640bb08cb5024202aa187597a9b8bf3b1d65c
-
SSDEEP
12288:FytbV3kSoXaLnToslPqgwdkjLoz8YuP4SBEYjf22wuBLd:Eb5kSYaLTVlCtOjUEzEQwuld
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 436 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 1b15f78acd1fcfd0922d51e6b5f36120.exe 216 1b15f78acd1fcfd0922d51e6b5f36120.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 216 1b15f78acd1fcfd0922d51e6b5f36120.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 216 wrote to memory of 4600 216 1b15f78acd1fcfd0922d51e6b5f36120.exe 21 PID 216 wrote to memory of 4600 216 1b15f78acd1fcfd0922d51e6b5f36120.exe 21 PID 4600 wrote to memory of 436 4600 cmd.exe 16 PID 4600 wrote to memory of 436 4600 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b15f78acd1fcfd0922d51e6b5f36120.exe"C:\Users\Admin\AppData\Local\Temp\1b15f78acd1fcfd0922d51e6b5f36120.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1b15f78acd1fcfd0922d51e6b5f36120.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4600
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:436