Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 11:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7a14314d76c792f3e6d22b56a9f71470.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7a14314d76c792f3e6d22b56a9f71470.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
7a14314d76c792f3e6d22b56a9f71470.exe
-
Size
528KB
-
MD5
7a14314d76c792f3e6d22b56a9f71470
-
SHA1
df7fe9fa48fb0b9a38a4308a7af0e3bff7c74b47
-
SHA256
6523433e0ddc9215181d67d9396ebbbbea8808d6061e33f77cad93f6e2b64a8d
-
SHA512
03d65259fce4db204702c8ff663ca8b10e63d9208ad57a7a2c20c507e1af01d3c90ab5fb044215b096732cb4543b01d859bf625d76481942e9c24911e4161d40
-
SSDEEP
12288:FytbV3kSoXaLnToslhM7bDCQjtdFiOVVXfdib+hNX4Hj:Eb5kSYaLTVlC7aQjBiOVVvdibANX4D
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1172 7a14314d76c792f3e6d22b56a9f71470.exe 1172 7a14314d76c792f3e6d22b56a9f71470.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1172 7a14314d76c792f3e6d22b56a9f71470.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3560 1172 7a14314d76c792f3e6d22b56a9f71470.exe 85 PID 1172 wrote to memory of 3560 1172 7a14314d76c792f3e6d22b56a9f71470.exe 85 PID 3560 wrote to memory of 4724 3560 cmd.exe 87 PID 3560 wrote to memory of 4724 3560 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a14314d76c792f3e6d22b56a9f71470.exe"C:\Users\Admin\AppData\Local\Temp\7a14314d76c792f3e6d22b56a9f71470.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7a14314d76c792f3e6d22b56a9f71470.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4724
-
-