Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 13:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
974e7431b3c538a84024e3459a7408da.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
974e7431b3c538a84024e3459a7408da.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
974e7431b3c538a84024e3459a7408da.exe
-
Size
316KB
-
MD5
974e7431b3c538a84024e3459a7408da
-
SHA1
52e368caf5ed653b0209dd55387aa80a449d4762
-
SHA256
9c7ac2c4eebfe0d96df33e02b1963f26966e5a791875dcc80ab5ab3eb53cd849
-
SHA512
6eec597a60f738684ff813005832dd9f57fa807abbebd15a9bcd22d63a077292cb8ef9115c18653b619827ce4fd9da3a5f5f8c0f94f2b1aa189ef36e59dff49c
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEdyfd:FytbV3kSoXaLnToslos
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4992 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 974e7431b3c538a84024e3459a7408da.exe 2280 974e7431b3c538a84024e3459a7408da.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2280 974e7431b3c538a84024e3459a7408da.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2348 2280 974e7431b3c538a84024e3459a7408da.exe 84 PID 2280 wrote to memory of 2348 2280 974e7431b3c538a84024e3459a7408da.exe 84 PID 2348 wrote to memory of 4992 2348 cmd.exe 86 PID 2348 wrote to memory of 4992 2348 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\974e7431b3c538a84024e3459a7408da.exe"C:\Users\Admin\AppData\Local\Temp\974e7431b3c538a84024e3459a7408da.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\974e7431b3c538a84024e3459a7408da.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4992
-
-