Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 20:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe
-
Size
488KB
-
MD5
c179c6b2f7ec5ba8b5c38566f9f1c8fb
-
SHA1
ac3ef089823a9a8c7483ef5ee6aa4bd6ead1af91
-
SHA256
74a3a526e0822eb8b01169444eed932602ababf8fbea550b8ad7a4185647494d
-
SHA512
8350dfa7ea5ee12f52cf1b85b2fe1430c46f4e56e38d651ec38c1d363108df98de3e496b3a655319d181c34da2cbe01cc9fb5b5fab9d723b7d2c328368e65e53
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEh3ODlpaYbBrLbX/nfDuGjQElqTxA5E:FytbV3kSoXaLnToslswJBrLbXffDVoxx
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4752 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 372 c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe 372 c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 372 c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 372 wrote to memory of 3472 372 c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe 91 PID 372 wrote to memory of 3472 372 c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe 91 PID 3472 wrote to memory of 4752 3472 cmd.exe 93 PID 3472 wrote to memory of 4752 3472 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe"C:\Users\Admin\AppData\Local\Temp\c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c179c6b2f7ec5ba8b5c38566f9f1c8fb.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4752
-
-