Analysis
-
max time kernel
152s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3736a730bc90d9b9a7b77aa7c3c0050b.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3736a730bc90d9b9a7b77aa7c3c0050b.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
3736a730bc90d9b9a7b77aa7c3c0050b.exe
-
Size
2.2MB
-
MD5
3736a730bc90d9b9a7b77aa7c3c0050b
-
SHA1
d24b83075d0943e5da5bcd848f5b271416c65f5a
-
SHA256
aa08246ba17e735d0cf75c1f5387bd089362810f2e8281079bfa1bd10de17c6f
-
SHA512
3efa6e01ce259777e320a8a6e8b51ab7f998d59c81e7ed5fa07398e9759b861b801e7587be7accd7426bb2dac1a369814bde9896555e3fd22959e2058fca65d9
-
SSDEEP
49152:Eb5k2L5Hzi+HmMzoV8KAypp3knuXTlLOa9vg0bd21ik:EdNcAU9jNOa9vgQA1F
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 588 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2420 3736a730bc90d9b9a7b77aa7c3c0050b.exe 2420 3736a730bc90d9b9a7b77aa7c3c0050b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2420 3736a730bc90d9b9a7b77aa7c3c0050b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2768 2420 3736a730bc90d9b9a7b77aa7c3c0050b.exe 90 PID 2420 wrote to memory of 2768 2420 3736a730bc90d9b9a7b77aa7c3c0050b.exe 90 PID 2768 wrote to memory of 588 2768 cmd.exe 91 PID 2768 wrote to memory of 588 2768 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3736a730bc90d9b9a7b77aa7c3c0050b.exe"C:\Users\Admin\AppData\Local\Temp\3736a730bc90d9b9a7b77aa7c3c0050b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3736a730bc90d9b9a7b77aa7c3c0050b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:588
-
-