Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 10:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
71fcc37db3f8978285797dbd381b3742.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
71fcc37db3f8978285797dbd381b3742.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
71fcc37db3f8978285797dbd381b3742.exe
-
Size
488KB
-
MD5
71fcc37db3f8978285797dbd381b3742
-
SHA1
2763a1f5cf993489d76508fedcc5210bc09a063b
-
SHA256
10fffa0297e7a8be33067538132d108728e9e3c5dd8afbfa8f52b6033b3fb6e7
-
SHA512
f270deaee3a0c222911643bbe03127510aaebd9a9b14d2b4e863739892f8970ada4c6eef8a1811870d88b55af5cd925adff2160efb83baf1b4bee7ab8e0b74c6
-
SSDEEP
12288:FytbV3kSoXaLnToslzpgkq6xz1zDi5DZ0S+W+A:Eb5kSYaLTVljqmz1zDi5urfA
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2364 71fcc37db3f8978285797dbd381b3742.exe 2364 71fcc37db3f8978285797dbd381b3742.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 71fcc37db3f8978285797dbd381b3742.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 5088 2364 71fcc37db3f8978285797dbd381b3742.exe 85 PID 2364 wrote to memory of 5088 2364 71fcc37db3f8978285797dbd381b3742.exe 85 PID 5088 wrote to memory of 3656 5088 cmd.exe 87 PID 5088 wrote to memory of 3656 5088 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\71fcc37db3f8978285797dbd381b3742.exe"C:\Users\Admin\AppData\Local\Temp\71fcc37db3f8978285797dbd381b3742.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\71fcc37db3f8978285797dbd381b3742.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3656
-
-