Analysis
-
max time kernel
134s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 20:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
41cbde885dc2ba7dd7e66ee801063d37.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
41cbde885dc2ba7dd7e66ee801063d37.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
41cbde885dc2ba7dd7e66ee801063d37.exe
-
Size
644KB
-
MD5
41cbde885dc2ba7dd7e66ee801063d37
-
SHA1
de9755c2b8adc13fdb71e7d4f9cf2e819c31ba23
-
SHA256
1d6f787e64adc8b3d2b755ccb85f0175c23621fa4ac397bbeb2324dbeeab0efd
-
SHA512
af9cdab99801af95e48ce5b0d1927c2710cc0c03d1c78b9cb5b81be854d3a79630d65205adeeb87ba1b03a736b98da80f50881f5d2808d040e7656aad24b253d
-
SSDEEP
12288:FytbV3kSoXaLnToslwucukX9zavtjQUF5YlFYTHw1gS:Eb5kSYaLTVlwuJ4zavDF5YlShS
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3364 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1068 41cbde885dc2ba7dd7e66ee801063d37.exe 1068 41cbde885dc2ba7dd7e66ee801063d37.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1068 41cbde885dc2ba7dd7e66ee801063d37.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1944 1068 41cbde885dc2ba7dd7e66ee801063d37.exe 90 PID 1068 wrote to memory of 1944 1068 41cbde885dc2ba7dd7e66ee801063d37.exe 90 PID 1944 wrote to memory of 3364 1944 cmd.exe 92 PID 1944 wrote to memory of 3364 1944 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\41cbde885dc2ba7dd7e66ee801063d37.exe"C:\Users\Admin\AppData\Local\Temp\41cbde885dc2ba7dd7e66ee801063d37.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\41cbde885dc2ba7dd7e66ee801063d37.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3364
-
-