Analysis
-
max time kernel
146s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 20:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
41d0564dcaf0e4ee2632231d68ae0f5a.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
41d0564dcaf0e4ee2632231d68ae0f5a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
41d0564dcaf0e4ee2632231d68ae0f5a.exe
-
Size
316KB
-
MD5
41d0564dcaf0e4ee2632231d68ae0f5a
-
SHA1
3781e6ac5847683693d7324a22de1966a69eb8a2
-
SHA256
da74221276f4da306ffca5dc827ae41473e13b98a69a936b1ee9ba66b3dfea03
-
SHA512
d2f54782d77ecd716e7f19e9b123fca9a4ee59e1d07afb97743d62ce192ec79ffe5225fd8a3524dd8c833c555870bbed6f789f94a13403ec4beb5fd5979297df
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEVsamwDSHit:FytbV3kSoXaLnToslEVjOCt
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 516 41d0564dcaf0e4ee2632231d68ae0f5a.exe 516 41d0564dcaf0e4ee2632231d68ae0f5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 516 41d0564dcaf0e4ee2632231d68ae0f5a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 516 wrote to memory of 2672 516 41d0564dcaf0e4ee2632231d68ae0f5a.exe 88 PID 516 wrote to memory of 2672 516 41d0564dcaf0e4ee2632231d68ae0f5a.exe 88 PID 2672 wrote to memory of 1196 2672 cmd.exe 90 PID 2672 wrote to memory of 1196 2672 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d0564dcaf0e4ee2632231d68ae0f5a.exe"C:\Users\Admin\AppData\Local\Temp\41d0564dcaf0e4ee2632231d68ae0f5a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\41d0564dcaf0e4ee2632231d68ae0f5a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1196
-
-