Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 04:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe
-
Size
488KB
-
MD5
66b52b9fbc5ad2bac1c6d5f4a4ed7d53
-
SHA1
7379cfdd89b1c12f04be8d34e5e5a2f6fb70f056
-
SHA256
30fc5f6ef2a2993e709239874bd2bad3254e0772dfcd11ac0bb7f3cdeacff883
-
SHA512
69fa256d8092d543d505070398ca1e9ce3fa834323315f685675fada2fe29f697a92bdda44fa38f805f6415468e896d7f4db301eb5fcbe349ac5f7ba1fe52e99
-
SSDEEP
12288:FytbV3kSoXaLnToslNOQfm2hYLel4qq/4XIZGfOYdtxA8:Eb5kSYaLTVlTm2h+KqwXZdLX
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1996 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2488 66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe 2488 66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2488 66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe Token: SeManageVolumePrivilege 2944 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1464 2488 66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe 25 PID 2488 wrote to memory of 1464 2488 66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe 25 PID 1464 wrote to memory of 1996 1464 cmd.exe 27 PID 1464 wrote to memory of 1996 1464 cmd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe"C:\Users\Admin\AppData\Local\Temp\66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\66b52b9fbc5ad2bac1c6d5f4a4ed7d53.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1996
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2944