Analysis
-
max time kernel
143s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
10171635a5af167dd91086ab8f387543.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
10171635a5af167dd91086ab8f387543.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
10171635a5af167dd91086ab8f387543.exe
-
Size
528KB
-
MD5
10171635a5af167dd91086ab8f387543
-
SHA1
7d88f1be54f8a49c5075e57268e582564dedbd34
-
SHA256
df2971d10b7f85f8e7c6c5eff1711904bd4d5ab0117fd1dfa630463b1e911d44
-
SHA512
0b50e91d6a952f707d0f67f4eeb0a195c4f9aee0052c6c93e1b3b4275e22b26df87f12c2b13a9551ad6048e288fba62819fd0bb9520895e4401d9265ffeea9e1
-
SSDEEP
12288:FytbV3kSoXaLnTosl9XoD5DcEU/m6TWRqqcRbArWv:Eb5kSYaLTVl9+9e/5TWRqqcZIa
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4528 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1952 10171635a5af167dd91086ab8f387543.exe 1952 10171635a5af167dd91086ab8f387543.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1952 10171635a5af167dd91086ab8f387543.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 312 1952 10171635a5af167dd91086ab8f387543.exe 22 PID 1952 wrote to memory of 312 1952 10171635a5af167dd91086ab8f387543.exe 22 PID 312 wrote to memory of 4528 312 cmd.exe 18 PID 312 wrote to memory of 4528 312 cmd.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\10171635a5af167dd91086ab8f387543.exe"C:\Users\Admin\AppData\Local\Temp\10171635a5af167dd91086ab8f387543.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\10171635a5af167dd91086ab8f387543.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:312
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:4528