Analysis
-
max time kernel
155s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09dcc2494bdacc6f66978955c2fa4bc0.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
09dcc2494bdacc6f66978955c2fa4bc0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
09dcc2494bdacc6f66978955c2fa4bc0.exe
-
Size
528KB
-
MD5
09dcc2494bdacc6f66978955c2fa4bc0
-
SHA1
8b7bc581b6cb699675f4bef2676f62477c05443a
-
SHA256
1922457731e7717b15bf5355aea58831476ec6326be595f28da8cbccedad15b7
-
SHA512
f030ab22bb54e34a8a9aea06b30ac937d4c6502c3781a53913e388cfaa9f903c6382878b61ff34666e258b4ffabbf39c323bf83094472199852d4c2fd78bc8f2
-
SSDEEP
12288:FytbV3kSoXaLnTosleMFS4tlCrfUzmEWgX1eZw:Eb5kSYaLTVleDUl5cgX1eK
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4144 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5028 09dcc2494bdacc6f66978955c2fa4bc0.exe 5028 09dcc2494bdacc6f66978955c2fa4bc0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5028 09dcc2494bdacc6f66978955c2fa4bc0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4332 5028 09dcc2494bdacc6f66978955c2fa4bc0.exe 89 PID 5028 wrote to memory of 4332 5028 09dcc2494bdacc6f66978955c2fa4bc0.exe 89 PID 4332 wrote to memory of 4144 4332 cmd.exe 90 PID 4332 wrote to memory of 4144 4332 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\09dcc2494bdacc6f66978955c2fa4bc0.exe"C:\Users\Admin\AppData\Local\Temp\09dcc2494bdacc6f66978955c2fa4bc0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\09dcc2494bdacc6f66978955c2fa4bc0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4144
-
-