Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
752092a97d664fd30a8f2ef96dc778b1.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
752092a97d664fd30a8f2ef96dc778b1.exe
-
Size
1.6MB
-
MD5
752092a97d664fd30a8f2ef96dc778b1
-
SHA1
92bf641a940b3097ad35bd1691a4661360733659
-
SHA256
899788f15a90aef1df9f62ff1d39eaac3eacc400f88492faa367c82f6f3d8dea
-
SHA512
8b50b4b2849043fe9dc9081b26eb6134789f2e70b8a1f70aca89fbaaf6ad068009bff91e29c6136e28a0563d4d73f86c3bc3c32781e4b1fb3f6310ce9898f0aa
-
SSDEEP
24576:Eb5kSYaLTVlHy10y4msxThyv8B32EIUG3on2wuVvuM/VOTP3mmWCHlf0tPU:Eb5k2L5wJ4Hhm8BmEIoHgYTPaCHWtPU
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
752092a97d664fd30a8f2ef96dc778b1.exepid process 2316 752092a97d664fd30a8f2ef96dc778b1.exe 2316 752092a97d664fd30a8f2ef96dc778b1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
752092a97d664fd30a8f2ef96dc778b1.exedescription pid process Token: SeDebugPrivilege 2316 752092a97d664fd30a8f2ef96dc778b1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
752092a97d664fd30a8f2ef96dc778b1.execmd.exedescription pid process target process PID 2316 wrote to memory of 1960 2316 752092a97d664fd30a8f2ef96dc778b1.exe cmd.exe PID 2316 wrote to memory of 1960 2316 752092a97d664fd30a8f2ef96dc778b1.exe cmd.exe PID 1960 wrote to memory of 8 1960 cmd.exe PING.EXE PID 1960 wrote to memory of 8 1960 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\752092a97d664fd30a8f2ef96dc778b1.exe"C:\Users\Admin\AppData\Local\Temp\752092a97d664fd30a8f2ef96dc778b1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\752092a97d664fd30a8f2ef96dc778b1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:8
-
-