Analysis
-
max time kernel
147s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 02:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c4c6c4815fbc2072fef8374379a99b4.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4c4c6c4815fbc2072fef8374379a99b4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
4c4c6c4815fbc2072fef8374379a99b4.exe
-
Size
488KB
-
MD5
4c4c6c4815fbc2072fef8374379a99b4
-
SHA1
567d468726a9e65c62540375b57fb0d36976adc8
-
SHA256
ef6f2ae1bebe483bf5959a5cc83714128d0cbd5a77f89bcbd15bb843e3fce3af
-
SHA512
7c682cfa7eb579763b9f5c5f5e71dc7b385f2d2603a33da2c08c1de0a4d537a2d233081c1acf24bc2df1ca065323c3faba33363b21314364a94c9835fe2f2ebf
-
SSDEEP
12288:FytbV3kSoXaLnTosl80DXYoKIGLC+WiVkVWdvt:Eb5kSYaLTVl8IYoKrCYV6c
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5080 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 4c4c6c4815fbc2072fef8374379a99b4.exe 5112 4c4c6c4815fbc2072fef8374379a99b4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5112 4c4c6c4815fbc2072fef8374379a99b4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5112 wrote to memory of 464 5112 4c4c6c4815fbc2072fef8374379a99b4.exe 27 PID 5112 wrote to memory of 464 5112 4c4c6c4815fbc2072fef8374379a99b4.exe 27 PID 464 wrote to memory of 5080 464 cmd.exe 26 PID 464 wrote to memory of 5080 464 cmd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c4c6c4815fbc2072fef8374379a99b4.exe"C:\Users\Admin\AppData\Local\Temp\4c4c6c4815fbc2072fef8374379a99b4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4c4c6c4815fbc2072fef8374379a99b4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:464
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:5080