Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 19:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7dde4f8e0ec92b886367611ba353968a.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
7dde4f8e0ec92b886367611ba353968a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
7dde4f8e0ec92b886367611ba353968a.exe
-
Size
316KB
-
MD5
7dde4f8e0ec92b886367611ba353968a
-
SHA1
8d44261aaea520e37c91fdaf50cba4a64bd5a6b6
-
SHA256
336dc1e539b0e7c7f190bb89337dc615319d8762dc1e979165d8fe45ffda5c50
-
SHA512
ae3b7bcb883354ccc410c31fe4e12018fad0859828475a9b8f9d0a9b81102c51c2a1c94a42417bbff7b119a60cece797ee185cf5137347b80bef96f4848b9042
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEj7NalQ09lZwALV:FytbV3kSoXaLnTosl2NalbJ
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2412 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2256 7dde4f8e0ec92b886367611ba353968a.exe 2256 7dde4f8e0ec92b886367611ba353968a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2256 7dde4f8e0ec92b886367611ba353968a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 644 2256 7dde4f8e0ec92b886367611ba353968a.exe 85 PID 2256 wrote to memory of 644 2256 7dde4f8e0ec92b886367611ba353968a.exe 85 PID 644 wrote to memory of 2412 644 cmd.exe 86 PID 644 wrote to memory of 2412 644 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dde4f8e0ec92b886367611ba353968a.exe"C:\Users\Admin\AppData\Local\Temp\7dde4f8e0ec92b886367611ba353968a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\7dde4f8e0ec92b886367611ba353968a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2412
-
-