Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 12:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5b49edea7ad9e3222ee792ade0d201a6.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5b49edea7ad9e3222ee792ade0d201a6.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
5b49edea7ad9e3222ee792ade0d201a6.exe
-
Size
5.2MB
-
MD5
5b49edea7ad9e3222ee792ade0d201a6
-
SHA1
e77b3883f6599455d991c445f537de3eee986d1d
-
SHA256
9f615c9ee26d0cbd86ff0aed3bcbd5a392d9e74fbbe56eecb68d9019f324ae38
-
SHA512
a63d1864d9782a0ed505cde19405c5c1d0be34496d25c3079e6e29dc99b6c2a5c2f3f06acd8c3be6e0b959e2a4ce9db014cf231ac6b57ee919018911d5e73e57
-
SSDEEP
98304:EF6Gf3Uk++zxz4dno3b51tZGoeBsQ/N8dj/M5czDCLXknJr273MqGd:EFPf0dceBpKU54aXkQMqGd
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2072 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4216 5b49edea7ad9e3222ee792ade0d201a6.exe 4216 5b49edea7ad9e3222ee792ade0d201a6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4216 5b49edea7ad9e3222ee792ade0d201a6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4216 wrote to memory of 1196 4216 5b49edea7ad9e3222ee792ade0d201a6.exe 88 PID 4216 wrote to memory of 1196 4216 5b49edea7ad9e3222ee792ade0d201a6.exe 88 PID 1196 wrote to memory of 2072 1196 cmd.exe 90 PID 1196 wrote to memory of 2072 1196 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b49edea7ad9e3222ee792ade0d201a6.exe"C:\Users\Admin\AppData\Local\Temp\5b49edea7ad9e3222ee792ade0d201a6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\5b49edea7ad9e3222ee792ade0d201a6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2072
-
-