Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 10:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
164d9ef02f89b031e2c06a818df4261b.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
164d9ef02f89b031e2c06a818df4261b.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
164d9ef02f89b031e2c06a818df4261b.exe
-
Size
488KB
-
MD5
164d9ef02f89b031e2c06a818df4261b
-
SHA1
8c46c8e1101f92a96ff69a6c1d5885370e25e793
-
SHA256
4c4a72f5e43cfbea5a53ce890fa51f1836fead23c94a284b8a6dd5bb21159b43
-
SHA512
6e01ad18c1067ffff8535ad1fed5ae30caa67ad911b340c349efbb29e7fb6e9b6c799462ac8ad524976bf1fa613e266683b5649a32f2a2c6f973408f864cdcbb
-
SSDEEP
12288:FytbV3kSoXaLnTosl1Q4vApk7myPUor0A6l:Eb5kSYaLTVl1Y27myMorE
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1468 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4320 164d9ef02f89b031e2c06a818df4261b.exe 4320 164d9ef02f89b031e2c06a818df4261b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 164d9ef02f89b031e2c06a818df4261b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4320 wrote to memory of 2056 4320 164d9ef02f89b031e2c06a818df4261b.exe 88 PID 4320 wrote to memory of 2056 4320 164d9ef02f89b031e2c06a818df4261b.exe 88 PID 2056 wrote to memory of 1468 2056 cmd.exe 90 PID 2056 wrote to memory of 1468 2056 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\164d9ef02f89b031e2c06a818df4261b.exe"C:\Users\Admin\AppData\Local\Temp\164d9ef02f89b031e2c06a818df4261b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\164d9ef02f89b031e2c06a818df4261b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1468
-
-