Analysis
-
max time kernel
156s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ad198bba4e74b5b4bc8807c423b1847.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ad198bba4e74b5b4bc8807c423b1847.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0ad198bba4e74b5b4bc8807c423b1847.exe
-
Size
488KB
-
MD5
0ad198bba4e74b5b4bc8807c423b1847
-
SHA1
cb57a63bfed53beb40016962c5ab20bf6dfdbd74
-
SHA256
572ec9f42deb1ff3bbe3eb0a134b9aa2741182f364d3dca0bb8056760373de29
-
SHA512
1f6aa0e9eb49f93068d2a5142773a4022a1cfaf250718c8b16b4275630bace255a37fc1c2f56fe46093c7a16d6e5235dd34d041962faedc53af50946dab018ec
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEOk98xWV8P93sxqe+Ekv1OuBifp:FytbV3kSoXaLnTosl/z6k8xqxBOuBiR
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4892 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1616 0ad198bba4e74b5b4bc8807c423b1847.exe 1616 0ad198bba4e74b5b4bc8807c423b1847.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1616 0ad198bba4e74b5b4bc8807c423b1847.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3936 1616 0ad198bba4e74b5b4bc8807c423b1847.exe 89 PID 1616 wrote to memory of 3936 1616 0ad198bba4e74b5b4bc8807c423b1847.exe 89 PID 3936 wrote to memory of 4892 3936 cmd.exe 91 PID 3936 wrote to memory of 4892 3936 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad198bba4e74b5b4bc8807c423b1847.exe"C:\Users\Admin\AppData\Local\Temp\0ad198bba4e74b5b4bc8807c423b1847.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ad198bba4e74b5b4bc8807c423b1847.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4892
-
-