Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 21:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
045e36319950f651cec4daf9b06459ff.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
045e36319950f651cec4daf9b06459ff.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
045e36319950f651cec4daf9b06459ff.exe
-
Size
488KB
-
MD5
045e36319950f651cec4daf9b06459ff
-
SHA1
773ef693222d8f3136523aa7f6ae2e8e6faa0786
-
SHA256
61d9400699f00b9668fe5c89a9de0df9044720b1242ada0bc8c49cf1ac844abb
-
SHA512
df7a2799b03a48f2a348b857c06e6f49c44172604744d11a58ee8d16fe9ef0a9d76f15421c47c08dc19d0f44c00c594108a4234ce51b54a1ee6821bb1ae5e7da
-
SSDEEP
12288:FytbV3kSoXaLnTosl/JNelsSEPGjrYSBNSA:Eb5kSYaLTVl/JNMEDeND
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2932 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4492 045e36319950f651cec4daf9b06459ff.exe 4492 045e36319950f651cec4daf9b06459ff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4492 045e36319950f651cec4daf9b06459ff.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1232 4492 045e36319950f651cec4daf9b06459ff.exe 20 PID 4492 wrote to memory of 1232 4492 045e36319950f651cec4daf9b06459ff.exe 20 PID 1232 wrote to memory of 2932 1232 cmd.exe 16 PID 1232 wrote to memory of 2932 1232 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\045e36319950f651cec4daf9b06459ff.exe"C:\Users\Admin\AppData\Local\Temp\045e36319950f651cec4daf9b06459ff.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\045e36319950f651cec4daf9b06459ff.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1232
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2932