Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 17:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bc67871cac46b2a92fa89d6b9f7d34ed.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
bc67871cac46b2a92fa89d6b9f7d34ed.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
bc67871cac46b2a92fa89d6b9f7d34ed.exe
-
Size
528KB
-
MD5
bc67871cac46b2a92fa89d6b9f7d34ed
-
SHA1
356812b13c36177fd4a91bbb5c0a0a2450dd81be
-
SHA256
5a737ba84636a60ec1cc4e0a551b609cbf2c5e7fe5aadcf7e3d82ab0263c9c59
-
SHA512
46da2a2d2efd9ed70701dbabd0677d018ddd9cc81905201dade97084ee88e607e45c7fa3ffeac9f746f2edc5574eeff12fe08c25705baf097316912b60cda9a9
-
SSDEEP
12288:FytbV3kSoXaLnTosl+RMtOXGzGUDvDYUA/LPAUqifxSF:Eb5kSYaLTVl+RMtmGzDDPqQ
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2608 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 bc67871cac46b2a92fa89d6b9f7d34ed.exe 2008 bc67871cac46b2a92fa89d6b9f7d34ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2008 bc67871cac46b2a92fa89d6b9f7d34ed.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4760 2008 bc67871cac46b2a92fa89d6b9f7d34ed.exe 89 PID 2008 wrote to memory of 4760 2008 bc67871cac46b2a92fa89d6b9f7d34ed.exe 89 PID 4760 wrote to memory of 2608 4760 cmd.exe 91 PID 4760 wrote to memory of 2608 4760 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc67871cac46b2a92fa89d6b9f7d34ed.exe"C:\Users\Admin\AppData\Local\Temp\bc67871cac46b2a92fa89d6b9f7d34ed.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\bc67871cac46b2a92fa89d6b9f7d34ed.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2608
-
-