Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 19:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
65dad2280854665cf591a877eddcb5b6.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
65dad2280854665cf591a877eddcb5b6.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
65dad2280854665cf591a877eddcb5b6.exe
-
Size
488KB
-
MD5
65dad2280854665cf591a877eddcb5b6
-
SHA1
be5d19b57782e368d9e8d65b3999f4ecdddb1a13
-
SHA256
07a8799ef25afcb800baf7caff33dd7fd0a944c743bb260980f7cdc11a0ef463
-
SHA512
5d92fbbf2580ebd03f5da809ebe4e019466ae9db1645c80224d340fdfffa85e003edb95a74e0a3c9f36e3a544574394ab430764b99047bfe74b9f64e83b233a7
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEDlXBWQ7Fba7PASNPODWiqvRz5bfUvjsLp:FytbV3kSoXaLnToslr7PAoOxqAbmwg
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5008 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4244 65dad2280854665cf591a877eddcb5b6.exe 4244 65dad2280854665cf591a877eddcb5b6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4244 65dad2280854665cf591a877eddcb5b6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4244 wrote to memory of 2764 4244 65dad2280854665cf591a877eddcb5b6.exe 84 PID 4244 wrote to memory of 2764 4244 65dad2280854665cf591a877eddcb5b6.exe 84 PID 2764 wrote to memory of 5008 2764 cmd.exe 86 PID 2764 wrote to memory of 5008 2764 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\65dad2280854665cf591a877eddcb5b6.exe"C:\Users\Admin\AppData\Local\Temp\65dad2280854665cf591a877eddcb5b6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\65dad2280854665cf591a877eddcb5b6.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:5008
-
-