Analysis
-
max time kernel
95s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 05:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9652085feff694bba5655c872ded21ce.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
9652085feff694bba5655c872ded21ce.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
9652085feff694bba5655c872ded21ce.exe
-
Size
644KB
-
MD5
9652085feff694bba5655c872ded21ce
-
SHA1
f6fcfa607c23eab32e4f481d2804e941c85f77d9
-
SHA256
5605239c2949ebd47cf2e33cfc31c740f57aba52c03453fefe439fda79b20630
-
SHA512
97557a14d68b5dba09cb275c091e18c4ad2c1f7f4a022a7c49530fd2eb71bb62cbc2082094162e532bef82bda40731ee5ff66a6ef2dd20baf6656e0813dcbc19
-
SSDEEP
12288:FytbV3kSoXaLnToslK4Forb7QoeOk+cFq0/SLlCe3vEeENiQPH6Rad:Eb5kSYaLTVlK4ceOk+Oq0qL5EeRQ/ew
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4376 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4900 9652085feff694bba5655c872ded21ce.exe 4900 9652085feff694bba5655c872ded21ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 9652085feff694bba5655c872ded21ce.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3396 4900 9652085feff694bba5655c872ded21ce.exe 83 PID 4900 wrote to memory of 3396 4900 9652085feff694bba5655c872ded21ce.exe 83 PID 3396 wrote to memory of 4376 3396 cmd.exe 85 PID 3396 wrote to memory of 4376 3396 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9652085feff694bba5655c872ded21ce.exe"C:\Users\Admin\AppData\Local\Temp\9652085feff694bba5655c872ded21ce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\9652085feff694bba5655c872ded21ce.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4376
-
-