Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 22:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9a23449338a54e60e711b7c0081ced37.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
9a23449338a54e60e711b7c0081ced37.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
9a23449338a54e60e711b7c0081ced37.exe
-
Size
488KB
-
MD5
9a23449338a54e60e711b7c0081ced37
-
SHA1
a39c50a7513fdbdd1838a8e862ade767447e6264
-
SHA256
016aec24eca8baf4715afd3dc482669efe4a6f9faba308d939a6dd32e9de88d8
-
SHA512
2c75afc0e3efb9e01dd0044aad2e17e507b97f97e2d29b0239dd17c971a3734ba2bc8cabea00230b349a1fb5258c34fdc77cfd4df52a627ae6193bb010828af0
-
SSDEEP
12288:FytbV3kSoXaLnToslD4X6sNpyizBq2g8TAI:Eb5kSYaLTVlpQ0iVq2gQAI
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4664 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4092 9a23449338a54e60e711b7c0081ced37.exe 4092 9a23449338a54e60e711b7c0081ced37.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4092 9a23449338a54e60e711b7c0081ced37.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4092 wrote to memory of 1464 4092 9a23449338a54e60e711b7c0081ced37.exe 86 PID 4092 wrote to memory of 1464 4092 9a23449338a54e60e711b7c0081ced37.exe 86 PID 1464 wrote to memory of 4664 1464 cmd.exe 88 PID 1464 wrote to memory of 4664 1464 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a23449338a54e60e711b7c0081ced37.exe"C:\Users\Admin\AppData\Local\Temp\9a23449338a54e60e711b7c0081ced37.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\9a23449338a54e60e711b7c0081ced37.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4664
-
-