Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 22:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
70c36f4e126d4ff4d74034a4a04b55c0.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
70c36f4e126d4ff4d74034a4a04b55c0.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
70c36f4e126d4ff4d74034a4a04b55c0.exe
-
Size
644KB
-
MD5
70c36f4e126d4ff4d74034a4a04b55c0
-
SHA1
80c39db0db6e6cdd51bdfc85fba6fde7d5698b1f
-
SHA256
93886f2a7bb6a1c3deaab4464d4a47b6b2dd47274b93eca7e52449ec91e4b603
-
SHA512
cb845f9af0274bf81b35692d1ceeb9cb70151b764d7677d50c1da63cffff23022d27e51bc54e4c2b7f4c0c417f88cde830bd3f1f5236ba24e980cd15e96a2a79
-
SSDEEP
12288:FytbV3kSoXaLnToslVwy1E2D9xFmXAIP2mHgMzR8xAuTKTitxEP:Eb5kSYaLTVlVvvZxkV2MgM6GwGP
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2180 70c36f4e126d4ff4d74034a4a04b55c0.exe 2180 70c36f4e126d4ff4d74034a4a04b55c0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2180 70c36f4e126d4ff4d74034a4a04b55c0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 4336 2180 70c36f4e126d4ff4d74034a4a04b55c0.exe 17 PID 2180 wrote to memory of 4336 2180 70c36f4e126d4ff4d74034a4a04b55c0.exe 17 PID 4336 wrote to memory of 4904 4336 cmd.exe 13 PID 4336 wrote to memory of 4904 4336 cmd.exe 13
Processes
-
C:\Users\Admin\AppData\Local\Temp\70c36f4e126d4ff4d74034a4a04b55c0.exe"C:\Users\Admin\AppData\Local\Temp\70c36f4e126d4ff4d74034a4a04b55c0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\70c36f4e126d4ff4d74034a4a04b55c0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4336
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:4904