Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 06:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
401e3b4d60a9be2a36b9490eca1c1e64.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
401e3b4d60a9be2a36b9490eca1c1e64.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
401e3b4d60a9be2a36b9490eca1c1e64.exe
-
Size
488KB
-
MD5
401e3b4d60a9be2a36b9490eca1c1e64
-
SHA1
5dee55c8611f17b44b28baa152c833cde6abdcce
-
SHA256
c8588122654de227b0a5197cf34142bdbac16978be63d35acddc8efd97e97a6d
-
SHA512
fea276a446321d703bdfcca6d627c8b7665e3f63f2240856d8eb9c06bf969ab88954014ae58f669d4fff7b5a4541db4874a777281bc23ac2f8023bc98cc2eb86
-
SSDEEP
12288:FytbV3kSoXaLnToslrJta3NtBR/hvfMoK6:Eb5kSYaLTVl0K6
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4488 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 401e3b4d60a9be2a36b9490eca1c1e64.exe 2660 401e3b4d60a9be2a36b9490eca1c1e64.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 401e3b4d60a9be2a36b9490eca1c1e64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 808 2660 401e3b4d60a9be2a36b9490eca1c1e64.exe 20 PID 2660 wrote to memory of 808 2660 401e3b4d60a9be2a36b9490eca1c1e64.exe 20 PID 808 wrote to memory of 4488 808 cmd.exe 15 PID 808 wrote to memory of 4488 808 cmd.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\401e3b4d60a9be2a36b9490eca1c1e64.exe"C:\Users\Admin\AppData\Local\Temp\401e3b4d60a9be2a36b9490eca1c1e64.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\401e3b4d60a9be2a36b9490eca1c1e64.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:808
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:4488