Analysis
-
max time kernel
90s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 02:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
85ba272156bbe1963f0456ce772868aa.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
85ba272156bbe1963f0456ce772868aa.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
85ba272156bbe1963f0456ce772868aa.exe
-
Size
544KB
-
MD5
85ba272156bbe1963f0456ce772868aa
-
SHA1
aed1b87679516b82813e44eb15b55f316b602b91
-
SHA256
1f6fe175467b2b14410b2563bf105eddbd6436be3959e34cb303511d1c4082d3
-
SHA512
52884f606e70551f0f7c3305c3101f6aa06d6dae5bf837734e14ab91de6b91fdc8c0ab76c804a7c0a9e5204416eb8fba75f7f9c6ba96f61a3af44af1ff547384
-
SSDEEP
12288:FytbV3kSoXaLnToslQPzB298C0zTOjYr1Qga:Eb5kSYaLTVlezB2qzen
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2236 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 85ba272156bbe1963f0456ce772868aa.exe 3668 85ba272156bbe1963f0456ce772868aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3668 85ba272156bbe1963f0456ce772868aa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3864 3668 85ba272156bbe1963f0456ce772868aa.exe 85 PID 3668 wrote to memory of 3864 3668 85ba272156bbe1963f0456ce772868aa.exe 85 PID 3864 wrote to memory of 2236 3864 cmd.exe 87 PID 3864 wrote to memory of 2236 3864 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ba272156bbe1963f0456ce772868aa.exe"C:\Users\Admin\AppData\Local\Temp\85ba272156bbe1963f0456ce772868aa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\85ba272156bbe1963f0456ce772868aa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2236
-
-