Analysis
-
max time kernel
164s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2beaa1878d99e258414f248dfed87f4c.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2beaa1878d99e258414f248dfed87f4c.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
2beaa1878d99e258414f248dfed87f4c.exe
-
Size
5.1MB
-
MD5
2beaa1878d99e258414f248dfed87f4c
-
SHA1
09036b9210d2aff41963e7131e7c1cc0db16164d
-
SHA256
215d67f96a44166b6172599932cc8f68a0466aabbe3eeaf22c9df7591dd3799a
-
SHA512
37780fb340a210c173d7ea0f54d32de9ecbd3f19cc5ecb5b0c123107af8e64e4513b6a1160b1fc22055bd098f04cceee9dcc14fe5100878cb52e060986d878c8
-
SSDEEP
98304:EtAzaeX2+vSGoCzGAJOLCPidpLbLO66WEA5Cc64+0mFw30cGHC+yLDCx:EtA3bboAjPmhbLO7WE616fhF8AHC+ySx
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1368 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4036 2beaa1878d99e258414f248dfed87f4c.exe 4036 2beaa1878d99e258414f248dfed87f4c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4036 2beaa1878d99e258414f248dfed87f4c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4036 wrote to memory of 1180 4036 2beaa1878d99e258414f248dfed87f4c.exe 89 PID 4036 wrote to memory of 1180 4036 2beaa1878d99e258414f248dfed87f4c.exe 89 PID 1180 wrote to memory of 1368 1180 cmd.exe 91 PID 1180 wrote to memory of 1368 1180 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2beaa1878d99e258414f248dfed87f4c.exe"C:\Users\Admin\AppData\Local\Temp\2beaa1878d99e258414f248dfed87f4c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\2beaa1878d99e258414f248dfed87f4c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1368
-
-