Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0157e76849175bbc18b41cf039793cca.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0157e76849175bbc18b41cf039793cca.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0157e76849175bbc18b41cf039793cca.exe
-
Size
528KB
-
MD5
0157e76849175bbc18b41cf039793cca
-
SHA1
7d0d341c89828e4e252e85d496422a72f52b5b11
-
SHA256
514ed0909c8d14d4350558809d2d9111076848f7241c4cbc093008f3faaf5216
-
SHA512
505b9f8984085a01e08f9752ea3051a605fb90c3d5e2e620cc2421760b228b4e51781136ce50984c75888102e516a1b234eca6ecbebbb73618153c1e43bbac45
-
SSDEEP
12288:FytbV3kSoXaLnToslO5jtHtgvQEArb5x6m+:Eb5kSYaLTVlO5jtHTb7+
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3740 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 0157e76849175bbc18b41cf039793cca.exe 3640 0157e76849175bbc18b41cf039793cca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3640 0157e76849175bbc18b41cf039793cca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3640 wrote to memory of 3032 3640 0157e76849175bbc18b41cf039793cca.exe 90 PID 3640 wrote to memory of 3032 3640 0157e76849175bbc18b41cf039793cca.exe 90 PID 3032 wrote to memory of 3740 3032 cmd.exe 92 PID 3032 wrote to memory of 3740 3032 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0157e76849175bbc18b41cf039793cca.exe"C:\Users\Admin\AppData\Local\Temp\0157e76849175bbc18b41cf039793cca.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0157e76849175bbc18b41cf039793cca.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3740
-
-