Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 06:09

General

  • Target

    10ba2a053cc1b299102bdea13d12dc9d.exe

  • Size

    488KB

  • MD5

    10ba2a053cc1b299102bdea13d12dc9d

  • SHA1

    8045068eb9b4d7794b614a8b1efe4a03741349d2

  • SHA256

    a2c8b0fd8e5547e93c5043b5492eeb962d0456dc59115cf32a0f7a1e0022d5fc

  • SHA512

    58410c0b72391327ba2e3f90fe9ae8e838f7a84c7b0f1119fe648a96a947d758d5258c6af50d5d3e1e6b326c1ac8e5110a685258435ca4265144c197a50c582b

  • SSDEEP

    12288:FytbV3kSoXaLnToslEiB6VJJzYyaqVRUmEHyO+L:Eb5kSYaLTVlV67JnaCUmyyJ

Score
1/10

Malware Config

Signatures

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10ba2a053cc1b299102bdea13d12dc9d.exe
    "C:\Users\Admin\AppData\Local\Temp\10ba2a053cc1b299102bdea13d12dc9d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\10ba2a053cc1b299102bdea13d12dc9d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3584
  • C:\Windows\system32\PING.EXE
    ping 1.1.1.1 -n 1 -w 6000
    1⤵
    • Runs ping.exe
    PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads