Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b44c7aecb8bb6788ce4b29965741f041.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
b44c7aecb8bb6788ce4b29965741f041.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b44c7aecb8bb6788ce4b29965741f041.exe
-
Size
316KB
-
MD5
b44c7aecb8bb6788ce4b29965741f041
-
SHA1
cdc027178e643c7a3d7d887287531e6cd73bffbd
-
SHA256
31fe2ba55bde6d484745138aca907cd9b7c770e13c378ba3d1b5c602f841652a
-
SHA512
fb96ceef7f0a4fd77badc6f3c206d041192c26491b9aa00da52a22806e963226e38c447cbfd2fdb0b2417ec26736df7ff85746eb48ea1351b6a42991d6bd1859
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEPtRiM:FytbV3kSoXaLnToslutRZ
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 232 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 656 b44c7aecb8bb6788ce4b29965741f041.exe 656 b44c7aecb8bb6788ce4b29965741f041.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 656 b44c7aecb8bb6788ce4b29965741f041.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 656 wrote to memory of 3800 656 b44c7aecb8bb6788ce4b29965741f041.exe 97 PID 656 wrote to memory of 3800 656 b44c7aecb8bb6788ce4b29965741f041.exe 97 PID 3800 wrote to memory of 232 3800 cmd.exe 99 PID 3800 wrote to memory of 232 3800 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44c7aecb8bb6788ce4b29965741f041.exe"C:\Users\Admin\AppData\Local\Temp\b44c7aecb8bb6788ce4b29965741f041.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\b44c7aecb8bb6788ce4b29965741f041.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:232
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4268 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:2248