Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 12:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7757edde8657313599e535a80d6fd356.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7757edde8657313599e535a80d6fd356.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7757edde8657313599e535a80d6fd356.exe
-
Size
488KB
-
MD5
7757edde8657313599e535a80d6fd356
-
SHA1
0e994d38abc39686c584c9b8a0e9fb60289c4557
-
SHA256
623b9f298b4bc2806e320cada4e4f976e84cfe9ee2044503aa81591a020202a7
-
SHA512
4b46c6bb0bf22fb898de00f26819d898eb413919222ad9d24a9d8ceb4c8823319ac94c01d2b9cb1c6f6b3abdb8f8304c7b49c2295ecfe568239b24f7f23f9666
-
SSDEEP
12288:FytbV3kSoXaLnToslhxcQY93dC61434/Yj:Eb5kSYaLTVlhnuAY6
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3396 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3816 7757edde8657313599e535a80d6fd356.exe 3816 7757edde8657313599e535a80d6fd356.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3816 7757edde8657313599e535a80d6fd356.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1424 3816 7757edde8657313599e535a80d6fd356.exe 85 PID 3816 wrote to memory of 1424 3816 7757edde8657313599e535a80d6fd356.exe 85 PID 1424 wrote to memory of 3396 1424 cmd.exe 87 PID 1424 wrote to memory of 3396 1424 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7757edde8657313599e535a80d6fd356.exe"C:\Users\Admin\AppData\Local\Temp\7757edde8657313599e535a80d6fd356.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7757edde8657313599e535a80d6fd356.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3396
-
-