Analysis
-
max time kernel
155s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ab4a7b92ac79e485f34a6e5f0273709.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ab4a7b92ac79e485f34a6e5f0273709.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0ab4a7b92ac79e485f34a6e5f0273709.exe
-
Size
544KB
-
MD5
0ab4a7b92ac79e485f34a6e5f0273709
-
SHA1
dd72bda68ce499a1a527a67f5589a973a277e2a2
-
SHA256
a9510a9fc8b0395af47e935173aa3f65788a93caa3c8b8a774d73e06dfa5bcb7
-
SHA512
9ba04a17d6c842bef0ff9d43bf1545c7eb06605553f18e66163e5335ebb36739219033fd839678f6765309d7846cec49e2ca32f9e29ef0be0a459671b4c8e9f9
-
SSDEEP
12288:FytbV3kSoXaLnToslYxJtSXMomeQQZ1nuLxnHdWN7m:Eb5kSYaLTVlYXtS8om6XuLxHk6
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4112 0ab4a7b92ac79e485f34a6e5f0273709.exe 4112 0ab4a7b92ac79e485f34a6e5f0273709.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4112 0ab4a7b92ac79e485f34a6e5f0273709.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1140 4112 0ab4a7b92ac79e485f34a6e5f0273709.exe 88 PID 4112 wrote to memory of 1140 4112 0ab4a7b92ac79e485f34a6e5f0273709.exe 88 PID 1140 wrote to memory of 1988 1140 cmd.exe 90 PID 1140 wrote to memory of 1988 1140 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ab4a7b92ac79e485f34a6e5f0273709.exe"C:\Users\Admin\AppData\Local\Temp\0ab4a7b92ac79e485f34a6e5f0273709.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ab4a7b92ac79e485f34a6e5f0273709.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1988
-
-