Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
279c4e9277228980aa0a9383fccd559d.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
279c4e9277228980aa0a9383fccd559d.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
279c4e9277228980aa0a9383fccd559d.exe
-
Size
644KB
-
MD5
279c4e9277228980aa0a9383fccd559d
-
SHA1
5bccdd1faa61aae12f53f4626d3b3b4cd97770b2
-
SHA256
28180b0c8e58fef5393082eb9d2da71d2d1733225791159d455d24c67df197c4
-
SHA512
978cf3bb5bb6ae2c34dbfba8bbd6c4f6c2566939829fd7a32186520a2b4b3eccc1167b62d8c25e4016da29e9438e5866bd6088b36696ccfbf897560dee7495a0
-
SSDEEP
12288:FytbV3kSoXaLnTosl753sYYs5Ssc1Su0MBl34cJXFDK:Eb5kSYaLTVlFX3SjSu7BlN1e
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4872 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3484 279c4e9277228980aa0a9383fccd559d.exe 3484 279c4e9277228980aa0a9383fccd559d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3484 279c4e9277228980aa0a9383fccd559d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3484 wrote to memory of 2936 3484 279c4e9277228980aa0a9383fccd559d.exe 20 PID 3484 wrote to memory of 2936 3484 279c4e9277228980aa0a9383fccd559d.exe 20 PID 2936 wrote to memory of 4872 2936 cmd.exe 16 PID 2936 wrote to memory of 4872 2936 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\279c4e9277228980aa0a9383fccd559d.exe"C:\Users\Admin\AppData\Local\Temp\279c4e9277228980aa0a9383fccd559d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\279c4e9277228980aa0a9383fccd559d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2936
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:4872