Analysis

  • max time kernel
    155s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 01:51

General

  • Target

    0ab4a7b92ac79e485f34a6e5f0273709.exe

  • Size

    544KB

  • MD5

    0ab4a7b92ac79e485f34a6e5f0273709

  • SHA1

    dd72bda68ce499a1a527a67f5589a973a277e2a2

  • SHA256

    a9510a9fc8b0395af47e935173aa3f65788a93caa3c8b8a774d73e06dfa5bcb7

  • SHA512

    9ba04a17d6c842bef0ff9d43bf1545c7eb06605553f18e66163e5335ebb36739219033fd839678f6765309d7846cec49e2ca32f9e29ef0be0a459671b4c8e9f9

  • SSDEEP

    12288:FytbV3kSoXaLnToslYxJtSXMomeQQZ1nuLxnHdWN7m:Eb5kSYaLTVlYXtS8om6XuLxHk6

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ab4a7b92ac79e485f34a6e5f0273709.exe
    "C:\Users\Admin\AppData\Local\Temp\0ab4a7b92ac79e485f34a6e5f0273709.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ab4a7b92ac79e485f34a6e5f0273709.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\system32\PING.EXE
        ping 1.1.1.1 -n 1 -w 6000
        3⤵
        • Runs ping.exe
        PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads