Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 12:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36764dfa2e35c8a044970ba6a484d13d.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
36764dfa2e35c8a044970ba6a484d13d.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
36764dfa2e35c8a044970ba6a484d13d.exe
-
Size
316KB
-
MD5
36764dfa2e35c8a044970ba6a484d13d
-
SHA1
09ee03f65222d4656435f52d21edc397b5869040
-
SHA256
63813440037ec8b565f485fc92a581b148b1c73e24582080f3bf7b1cf1d79a4a
-
SHA512
0bea5a61a302dd6c00b124f88294e0f939ea67a539a2fb610adcb206c15c8befaf300ee86bf40562e38e32d29b857e91e3fb81f65452d7280c5cef045f752b51
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiElxP3TgOzd:FytbV3kSoXaLnTosl6Rga
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1176 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4956 36764dfa2e35c8a044970ba6a484d13d.exe 4956 36764dfa2e35c8a044970ba6a484d13d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4956 36764dfa2e35c8a044970ba6a484d13d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3616 4956 36764dfa2e35c8a044970ba6a484d13d.exe 14 PID 4956 wrote to memory of 3616 4956 36764dfa2e35c8a044970ba6a484d13d.exe 14 PID 3616 wrote to memory of 1176 3616 cmd.exe 15 PID 3616 wrote to memory of 1176 3616 cmd.exe 15
Processes
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\36764dfa2e35c8a044970ba6a484d13d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60002⤵
- Runs ping.exe
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\36764dfa2e35c8a044970ba6a484d13d.exe"C:\Users\Admin\AppData\Local\Temp\36764dfa2e35c8a044970ba6a484d13d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956