Analysis
-
max time kernel
179s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e7f4397394956294f3fffab29630b14.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e7f4397394956294f3fffab29630b14.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0e7f4397394956294f3fffab29630b14.exe
-
Size
544KB
-
MD5
0e7f4397394956294f3fffab29630b14
-
SHA1
272a4d4510d441f7f3ef3e2fde9854e3a90670d3
-
SHA256
12b0d44a0a5e7ceff89ece5200ff8958d152bfbbbd12137cacc24c63603e547e
-
SHA512
1aa3070a8e8672fec5c03733415c6030ecdd2319f538a94c0686bc33192b70125618ce891af817826c6b4332cd33e2a3abdc8292135ead5d8622022c1161db79
-
SSDEEP
12288:FytbV3kSoXaLnToslot+oUkhVQyd/tph+T0Qpeng9E2:Eb5kSYaLTVl+BhT+TTz9p
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4060 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4800 0e7f4397394956294f3fffab29630b14.exe 4800 0e7f4397394956294f3fffab29630b14.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4800 0e7f4397394956294f3fffab29630b14.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4528 4800 0e7f4397394956294f3fffab29630b14.exe 16 PID 4800 wrote to memory of 4528 4800 0e7f4397394956294f3fffab29630b14.exe 16 PID 4528 wrote to memory of 4060 4528 cmd.exe 19 PID 4528 wrote to memory of 4060 4528 cmd.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7f4397394956294f3fffab29630b14.exe"C:\Users\Admin\AppData\Local\Temp\0e7f4397394956294f3fffab29630b14.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0e7f4397394956294f3fffab29630b14.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4060
-
-