Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 06:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4fdb94af48e9a5284121b4944cfe76e4.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4fdb94af48e9a5284121b4944cfe76e4.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
4fdb94af48e9a5284121b4944cfe76e4.exe
-
Size
488KB
-
MD5
4fdb94af48e9a5284121b4944cfe76e4
-
SHA1
27879cefedf1450b1e7d5fff1178d2037dc420f8
-
SHA256
4681dc02db65d6e682d4e886f7df2234de408547ec449b535bfb593eabf8a682
-
SHA512
6a899831a0a9853ff084482abb46483ae81b655fdc5ccae9124ee8c566a3bee9a3e254454777f0b5ac3f335968793e68ac02dce87ec5f4a38c83a83f4f4a1743
-
SSDEEP
12288:FytbV3kSoXaLnTosl+ssYM/gKEK0hDUgfdg:Eb5kSYaLTVl+x/XuRy
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1720 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3720 4fdb94af48e9a5284121b4944cfe76e4.exe 3720 4fdb94af48e9a5284121b4944cfe76e4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3720 4fdb94af48e9a5284121b4944cfe76e4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4636 3720 4fdb94af48e9a5284121b4944cfe76e4.exe 20 PID 3720 wrote to memory of 4636 3720 4fdb94af48e9a5284121b4944cfe76e4.exe 20 PID 4636 wrote to memory of 1720 4636 cmd.exe 16 PID 4636 wrote to memory of 1720 4636 cmd.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fdb94af48e9a5284121b4944cfe76e4.exe"C:\Users\Admin\AppData\Local\Temp\4fdb94af48e9a5284121b4944cfe76e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4fdb94af48e9a5284121b4944cfe76e4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4636
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:1720