Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 07:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b41a0a7323cda92f1e8dce44056ad0d3.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b41a0a7323cda92f1e8dce44056ad0d3.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
b41a0a7323cda92f1e8dce44056ad0d3.exe
-
Size
488KB
-
MD5
b41a0a7323cda92f1e8dce44056ad0d3
-
SHA1
d7c00c22907d8bf20f4607829278ea6670a488e2
-
SHA256
c835e24e328079094763192e69f2f362b3ec0547affae59f1b1bbc16c2d8edd7
-
SHA512
6e6e6957ab5658d5c6d255269ee98a4bd4db5af16d0f0a6defbb78c860cb2162ebe9a4e0ff5c44e5354c892c37ab3f8d4cf9906af0a463e33c14dd13ec57cb4a
-
SSDEEP
12288:FytbV3kSoXaLnToslYUVIlhif2XiZNwjsJ:Eb5kSYaLTVlXGlkf2Xi8sJ
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 928 b41a0a7323cda92f1e8dce44056ad0d3.exe 928 b41a0a7323cda92f1e8dce44056ad0d3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 928 b41a0a7323cda92f1e8dce44056ad0d3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 928 wrote to memory of 4324 928 b41a0a7323cda92f1e8dce44056ad0d3.exe 95 PID 928 wrote to memory of 4324 928 b41a0a7323cda92f1e8dce44056ad0d3.exe 95 PID 4324 wrote to memory of 3100 4324 cmd.exe 97 PID 4324 wrote to memory of 3100 4324 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b41a0a7323cda92f1e8dce44056ad0d3.exe"C:\Users\Admin\AppData\Local\Temp\b41a0a7323cda92f1e8dce44056ad0d3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b41a0a7323cda92f1e8dce44056ad0d3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3724 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:81⤵PID:3536