Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 01:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
982cad1aca0c8271815d0f61ab03eaf9.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
982cad1aca0c8271815d0f61ab03eaf9.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
982cad1aca0c8271815d0f61ab03eaf9.exe
-
Size
316KB
-
MD5
982cad1aca0c8271815d0f61ab03eaf9
-
SHA1
c4d20b0245c37ee43bbcfa1d4e746f499b05caae
-
SHA256
889c30d018c36450ba385c2463e7213ecfcc77fe616b87c8198b6b4ca6e0a170
-
SHA512
26e044b764aff33d01c2427fca3d025b747788d98d96e25e309311f12026c5f6ba01776d14c1dab4c9533767efbed1e202370b48af17efee021c32c5d3f4ac21
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEkETgP7YG:FytbV3kSoXaLnToslQTkYG
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2812 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 982cad1aca0c8271815d0f61ab03eaf9.exe 1948 982cad1aca0c8271815d0f61ab03eaf9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 982cad1aca0c8271815d0f61ab03eaf9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4448 1948 982cad1aca0c8271815d0f61ab03eaf9.exe 85 PID 1948 wrote to memory of 4448 1948 982cad1aca0c8271815d0f61ab03eaf9.exe 85 PID 4448 wrote to memory of 2812 4448 cmd.exe 87 PID 4448 wrote to memory of 2812 4448 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\982cad1aca0c8271815d0f61ab03eaf9.exe"C:\Users\Admin\AppData\Local\Temp\982cad1aca0c8271815d0f61ab03eaf9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\982cad1aca0c8271815d0f61ab03eaf9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2812
-
-