Analysis
-
max time kernel
311s -
max time network
324s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
02/01/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral3
Sample
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe
Resource
win11-20231222-en
General
-
Target
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe
-
Size
316KB
-
MD5
21f975ea4e195c4d80320bbdd92eda79
-
SHA1
6340f769ce5323525514ec333ee3ab86153b852b
-
SHA256
023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee
-
SHA512
2dcb1d79c498ef4026bd7b3a6b0c4d2c85444eea2359bacbe4a7fc0c910aa7d02b6f955f1cd39860d810e3cec41724368c37e2e66a71a1fa461971985e234d0e
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiExwk3yBLcoi:FytbV3kSoXaLnToslWz3yBvi
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2132 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe 2352 023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2352 023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3700 2352 023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe 72 PID 2352 wrote to memory of 3700 2352 023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe 72 PID 3700 wrote to memory of 2132 3700 cmd.exe 74 PID 3700 wrote to memory of 2132 3700 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe"C:\Users\Admin\AppData\Local\Temp\023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\023b4504bbe299a9a289bf6a85da5a0622e13526d9071dc15e226597073be9ee.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2132
-
-