Analysis
-
max time kernel
181s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1d674e24157270a91d12f57f4e9c9542.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d674e24157270a91d12f57f4e9c9542.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1d674e24157270a91d12f57f4e9c9542.exe
-
Size
488KB
-
MD5
1d674e24157270a91d12f57f4e9c9542
-
SHA1
4d87c7a9d70abd67c86c7acc5b0b069449350c33
-
SHA256
ebe79db9219d9005c6ad6c537146208d401249c720a39efd2927c8689c09132b
-
SHA512
e1cdfe785ab25710ce91d1ec50c7e2af54ce54d2e2b3ea1d0904bced42c72810913f012c06b642b0e78f29c9c15cc266a77a883ee18bf18de7bcc6c00306835d
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiE9eaOCdXZwOEY3HEaqzwA5rrFXktY0b+Bj:FytbV3kSoXaLnTosl9KZd3HEaSw2r5q2
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3192 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 1d674e24157270a91d12f57f4e9c9542.exe 2876 1d674e24157270a91d12f57f4e9c9542.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 1d674e24157270a91d12f57f4e9c9542.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1896 2876 1d674e24157270a91d12f57f4e9c9542.exe 90 PID 2876 wrote to memory of 1896 2876 1d674e24157270a91d12f57f4e9c9542.exe 90 PID 1896 wrote to memory of 3192 1896 cmd.exe 92 PID 1896 wrote to memory of 3192 1896 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d674e24157270a91d12f57f4e9c9542.exe"C:\Users\Admin\AppData\Local\Temp\1d674e24157270a91d12f57f4e9c9542.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1d674e24157270a91d12f57f4e9c9542.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3192
-
-