Analysis
-
max time kernel
103s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 19:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8a5946485ef91dc93592d65e1fa83208.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
8a5946485ef91dc93592d65e1fa83208.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
8a5946485ef91dc93592d65e1fa83208.exe
-
Size
316KB
-
MD5
8a5946485ef91dc93592d65e1fa83208
-
SHA1
354f3e98669ec3eb82fc2b3b7e20bd92ed47be20
-
SHA256
d6ced484f4e0be653059a5d7fb70ef00a417e7b5b4596ca18422d2dfd7d8f009
-
SHA512
4a7899a432403c6775dc9f00d9dc6b18b33019d9e8857f8c2e1e4bf50be02ca1a0b9c6e242f5172f9b3512a67fab8ff4d078aafcdc58f678793f9bb055ed7a53
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEW6Pw64HMq/U:FytbV3kSoXaLnToslJ6PwfM3
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 184 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4864 8a5946485ef91dc93592d65e1fa83208.exe 4864 8a5946485ef91dc93592d65e1fa83208.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4864 8a5946485ef91dc93592d65e1fa83208.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3776 4864 8a5946485ef91dc93592d65e1fa83208.exe 85 PID 4864 wrote to memory of 3776 4864 8a5946485ef91dc93592d65e1fa83208.exe 85 PID 3776 wrote to memory of 184 3776 cmd.exe 87 PID 3776 wrote to memory of 184 3776 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a5946485ef91dc93592d65e1fa83208.exe"C:\Users\Admin\AppData\Local\Temp\8a5946485ef91dc93592d65e1fa83208.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\8a5946485ef91dc93592d65e1fa83208.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:184
-
-