Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21ebe3443fbdcb63b1c4de55d9f512d5.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
21ebe3443fbdcb63b1c4de55d9f512d5.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
21ebe3443fbdcb63b1c4de55d9f512d5.exe
-
Size
488KB
-
MD5
21ebe3443fbdcb63b1c4de55d9f512d5
-
SHA1
433c7733a36cd00bb031e6dcfeb68531e88a84fd
-
SHA256
64452ece5a0995c0c10a206f5ca09999ae08152faca7611b4863a2efa40c20a4
-
SHA512
ec51b1018df9930a553c1a43ca34287f2e437b70ebef9c89d3d0a5f5bb0c8acb80e13ec08b4e1aa1f06f3142aa3557d0fb007b16bb517ee84b9e86dd4c4f2c48
-
SSDEEP
12288:FytbV3kSoXaLnToslIqgu/myI89KtZNHTCX:Eb5kSYaLTVluuI89cDzCX
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3816 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1456 21ebe3443fbdcb63b1c4de55d9f512d5.exe 1456 21ebe3443fbdcb63b1c4de55d9f512d5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1456 21ebe3443fbdcb63b1c4de55d9f512d5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2400 1456 21ebe3443fbdcb63b1c4de55d9f512d5.exe 18 PID 1456 wrote to memory of 2400 1456 21ebe3443fbdcb63b1c4de55d9f512d5.exe 18 PID 2400 wrote to memory of 3816 2400 cmd.exe 16 PID 2400 wrote to memory of 3816 2400 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ebe3443fbdcb63b1c4de55d9f512d5.exe"C:\Users\Admin\AppData\Local\Temp\21ebe3443fbdcb63b1c4de55d9f512d5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\21ebe3443fbdcb63b1c4de55d9f512d5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2400
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:3816