Analysis
-
max time kernel
144s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1dd06441fdccdbb547c5fb8209f6101c.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1dd06441fdccdbb547c5fb8209f6101c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1dd06441fdccdbb547c5fb8209f6101c.exe
-
Size
316KB
-
MD5
1dd06441fdccdbb547c5fb8209f6101c
-
SHA1
7e07129cf66e6cf2a432c15aed0306b823381aa3
-
SHA256
b49aa28e75b0ada69f962ea5ca48d6b1f60ad9086395be7a28c70d25744a991f
-
SHA512
43a8dcd332b05a02ba4d015f56272a10d3ce7d5295705d85dd76f906d1c058409b8556d16b13ac5739845f459b585772d937199172f6d1620de1baae8a6987af
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEMTN1vkfI:FytbV3kSoXaLnToslHXsg
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3432 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2100 1dd06441fdccdbb547c5fb8209f6101c.exe 2100 1dd06441fdccdbb547c5fb8209f6101c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 1dd06441fdccdbb547c5fb8209f6101c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 4392 2100 1dd06441fdccdbb547c5fb8209f6101c.exe 80 PID 2100 wrote to memory of 4392 2100 1dd06441fdccdbb547c5fb8209f6101c.exe 80 PID 4392 wrote to memory of 3432 4392 cmd.exe 91 PID 4392 wrote to memory of 3432 4392 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dd06441fdccdbb547c5fb8209f6101c.exe"C:\Users\Admin\AppData\Local\Temp\1dd06441fdccdbb547c5fb8209f6101c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1dd06441fdccdbb547c5fb8209f6101c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3432
-
-