Analysis
-
max time kernel
144s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 23:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ff112a0767f6e801a78a53e072d5a189.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ff112a0767f6e801a78a53e072d5a189.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
ff112a0767f6e801a78a53e072d5a189.exe
-
Size
544KB
-
MD5
ff112a0767f6e801a78a53e072d5a189
-
SHA1
2b227bff3e3c751a988e3de45e650bdc8497d737
-
SHA256
1c938f30b5f245d24a4391df8d373190198829467d7e12059b24aac962ba366d
-
SHA512
11989911accf925e72b853fa37960a7363cd7dd65aa0ff2f4c40a13b01258b996f1946d8092455ab3a1a386364d8559660c51b92e483ef14bf59b823ac07f5cd
-
SSDEEP
12288:FytbV3kSoXaLnToslNT/i3hL6M65uCDek7IbkyaW:Eb5kSYaLTVlNT/Ih99dH
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2212 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1128 ff112a0767f6e801a78a53e072d5a189.exe 1128 ff112a0767f6e801a78a53e072d5a189.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1128 ff112a0767f6e801a78a53e072d5a189.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1452 1128 ff112a0767f6e801a78a53e072d5a189.exe 18 PID 1128 wrote to memory of 1452 1128 ff112a0767f6e801a78a53e072d5a189.exe 18 PID 1452 wrote to memory of 2212 1452 cmd.exe 20 PID 1452 wrote to memory of 2212 1452 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff112a0767f6e801a78a53e072d5a189.exe"C:\Users\Admin\AppData\Local\Temp\ff112a0767f6e801a78a53e072d5a189.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\ff112a0767f6e801a78a53e072d5a189.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2212
-
-