Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0c9706c03dc45f8343f3542129e1e942.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c9706c03dc45f8343f3542129e1e942.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0c9706c03dc45f8343f3542129e1e942.exe
-
Size
488KB
-
MD5
0c9706c03dc45f8343f3542129e1e942
-
SHA1
6f9ed9caea2cea199eb8ff188e838f1713fc517b
-
SHA256
a4c900e6b0d62db72b8b35f47b4b70e7242ab520315e2ac0d49b1b98682cc816
-
SHA512
411d2c90f4b205a982783d6ecc2eef9399703f950c33c8fe1b601d749af017fd9d091cbe43217c47f6d587a65e07130725f84e54ae13e61eeaf7c5b858c30d90
-
SSDEEP
12288:FytbV3kSoXaLnToslvCUJe7Jw4xE5UxpAS/:Eb5kSYaLTVlvfUt5GsaS/
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4468 0c9706c03dc45f8343f3542129e1e942.exe 4468 0c9706c03dc45f8343f3542129e1e942.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4468 0c9706c03dc45f8343f3542129e1e942.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2996 4468 0c9706c03dc45f8343f3542129e1e942.exe 88 PID 4468 wrote to memory of 2996 4468 0c9706c03dc45f8343f3542129e1e942.exe 88 PID 2996 wrote to memory of 3716 2996 cmd.exe 90 PID 2996 wrote to memory of 3716 2996 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c9706c03dc45f8343f3542129e1e942.exe"C:\Users\Admin\AppData\Local\Temp\0c9706c03dc45f8343f3542129e1e942.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0c9706c03dc45f8343f3542129e1e942.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3716
-
-