Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 04:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7c26883cef9ecbba20f31b9c549641d0.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7c26883cef9ecbba20f31b9c549641d0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
7c26883cef9ecbba20f31b9c549641d0.exe
-
Size
316KB
-
MD5
7c26883cef9ecbba20f31b9c549641d0
-
SHA1
242fda0c19dd57011a06c63ece3db7027ca70cf5
-
SHA256
ecb52f519508086c524ef7ecf75b99cde7f52c1073aca4982354e1915ed4b91e
-
SHA512
6406ba0beff5d61013cae3bbf779b629787078386dee2a717c28840dd76e487a05edcda65446058c3ef1826a97226e6148df94e45831919fe030ac6fb8efd3bc
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEHew2eTtbz:FytbV3kSoXaLnToslYhtbz
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4864 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4176 7c26883cef9ecbba20f31b9c549641d0.exe 4176 7c26883cef9ecbba20f31b9c549641d0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4176 7c26883cef9ecbba20f31b9c549641d0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4176 wrote to memory of 2816 4176 7c26883cef9ecbba20f31b9c549641d0.exe 85 PID 4176 wrote to memory of 2816 4176 7c26883cef9ecbba20f31b9c549641d0.exe 85 PID 2816 wrote to memory of 4864 2816 cmd.exe 87 PID 2816 wrote to memory of 4864 2816 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c26883cef9ecbba20f31b9c549641d0.exe"C:\Users\Admin\AppData\Local\Temp\7c26883cef9ecbba20f31b9c549641d0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7c26883cef9ecbba20f31b9c549641d0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4864
-
-