Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 12:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5684debb315de5541afb2db31edb6053.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5684debb315de5541afb2db31edb6053.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
5684debb315de5541afb2db31edb6053.exe
-
Size
488KB
-
MD5
5684debb315de5541afb2db31edb6053
-
SHA1
0a7e3a28f6b105c95a0c332d4468526a41c62403
-
SHA256
5a49b2ea7c66af7c2d167bea1eeb3b3df50cf428beeb4bdbc6b54c0ded642ff6
-
SHA512
635df396e41c0df3854a894f6af9fec0af04916728ee126784fe24199ea565415c243d4f57b8d8574dc636fa8bbfd186cd70cc374ae901bc53109bd1fdd14000
-
SSDEEP
12288:FytbV3kSoXaLnToslBdaPrkzodQ+OicAUXDQRL:Eb5kSYaLTVlBdkrkzoC+4A1L
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2068 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2796 5684debb315de5541afb2db31edb6053.exe 2796 5684debb315de5541afb2db31edb6053.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 5684debb315de5541afb2db31edb6053.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3868 2796 5684debb315de5541afb2db31edb6053.exe 88 PID 2796 wrote to memory of 3868 2796 5684debb315de5541afb2db31edb6053.exe 88 PID 3868 wrote to memory of 2068 3868 cmd.exe 90 PID 3868 wrote to memory of 2068 3868 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5684debb315de5541afb2db31edb6053.exe"C:\Users\Admin\AppData\Local\Temp\5684debb315de5541afb2db31edb6053.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5684debb315de5541afb2db31edb6053.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2068
-
-