Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ad9d0f1bdf0520ce37acdbea43233d5.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ad9d0f1bdf0520ce37acdbea43233d5.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0ad9d0f1bdf0520ce37acdbea43233d5.exe
-
Size
488KB
-
MD5
0ad9d0f1bdf0520ce37acdbea43233d5
-
SHA1
7b8103270de1456a191b0dbc02ca592fcfcfc941
-
SHA256
a824e65ada2078e8ff6e2f8403343c26df45f5a98797dd2a3c881d64cedb055e
-
SHA512
c44ba640b51649a894f2fbc7b1d6c5806cf8783743e4e443a8115c8f01c20f21bd7a31abc5948bd07fcde90b021856aed668d47cb4d8206d31e86aa1e6a701ee
-
SSDEEP
12288:FytbV3kSoXaLnToslY8KHUt79oGkDcFu4dAcML6HE:Eb5kSYaLTVlGUt79o4hOV9
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3920 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4932 0ad9d0f1bdf0520ce37acdbea43233d5.exe 4932 0ad9d0f1bdf0520ce37acdbea43233d5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4932 0ad9d0f1bdf0520ce37acdbea43233d5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1092 4932 0ad9d0f1bdf0520ce37acdbea43233d5.exe 89 PID 4932 wrote to memory of 1092 4932 0ad9d0f1bdf0520ce37acdbea43233d5.exe 89 PID 1092 wrote to memory of 3920 1092 cmd.exe 91 PID 1092 wrote to memory of 3920 1092 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad9d0f1bdf0520ce37acdbea43233d5.exe"C:\Users\Admin\AppData\Local\Temp\0ad9d0f1bdf0520ce37acdbea43233d5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0ad9d0f1bdf0520ce37acdbea43233d5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3920
-
-