Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 13:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c0b7082e9c825581cd10d517c0842e01.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c0b7082e9c825581cd10d517c0842e01.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c0b7082e9c825581cd10d517c0842e01.exe
-
Size
488KB
-
MD5
c0b7082e9c825581cd10d517c0842e01
-
SHA1
9212ea4e336feaa7c0c62be2a68354a83a9f8205
-
SHA256
0f8dc7bc68d808dcd7e787eadb1656dcaa2028f54477e3a2ac2799c7f18c8377
-
SHA512
7e5506602ac75f7a3fb14055e388d563c0e46ad74a287e0d8056bb4d99784adace974cab51ec2997650aa7410244623a0d3c48791f4bb000802e879edb8ded5f
-
SSDEEP
12288:FytbV3kSoXaLnToslh8d45EE7pTYdxMdVT0P:Eb5kSYaLTVla+EEMMb0P
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3968 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 932 c0b7082e9c825581cd10d517c0842e01.exe 932 c0b7082e9c825581cd10d517c0842e01.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 932 c0b7082e9c825581cd10d517c0842e01.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 932 wrote to memory of 1712 932 c0b7082e9c825581cd10d517c0842e01.exe 92 PID 932 wrote to memory of 1712 932 c0b7082e9c825581cd10d517c0842e01.exe 92 PID 1712 wrote to memory of 3968 1712 cmd.exe 94 PID 1712 wrote to memory of 3968 1712 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0b7082e9c825581cd10d517c0842e01.exe"C:\Users\Admin\AppData\Local\Temp\c0b7082e9c825581cd10d517c0842e01.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c0b7082e9c825581cd10d517c0842e01.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3968
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5016 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:1096