Analysis
-
max time kernel
175s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 09:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
14d1675a59b80b4a6643fc9f62a5a0db.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
14d1675a59b80b4a6643fc9f62a5a0db.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
14d1675a59b80b4a6643fc9f62a5a0db.exe
-
Size
316KB
-
MD5
14d1675a59b80b4a6643fc9f62a5a0db
-
SHA1
d7effa5e5264027dc7058335a518fba0e268fae3
-
SHA256
ab548f487684d866ee547dfe8a3288b058708b6f3feb325215ada42fff890496
-
SHA512
f871afc894cbedb37ce3fa45fff61d57ee858a0647b45b2b706121f006e998b12b1d07dc729253a808f6b7f6671c45ba46fb7faac7420575ba4e8a0ce7d30bc6
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiESBfKvPr:FytbV3kSoXaLnToslpW
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2788 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 14d1675a59b80b4a6643fc9f62a5a0db.exe 2000 14d1675a59b80b4a6643fc9f62a5a0db.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 14d1675a59b80b4a6643fc9f62a5a0db.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3096 2000 14d1675a59b80b4a6643fc9f62a5a0db.exe 88 PID 2000 wrote to memory of 3096 2000 14d1675a59b80b4a6643fc9f62a5a0db.exe 88 PID 3096 wrote to memory of 2788 3096 cmd.exe 91 PID 3096 wrote to memory of 2788 3096 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d1675a59b80b4a6643fc9f62a5a0db.exe"C:\Users\Admin\AppData\Local\Temp\14d1675a59b80b4a6643fc9f62a5a0db.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\14d1675a59b80b4a6643fc9f62a5a0db.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2788
-
-