Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 03:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c4d98bf2f30a62f37731c9532e8d0374.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c4d98bf2f30a62f37731c9532e8d0374.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c4d98bf2f30a62f37731c9532e8d0374.exe
-
Size
316KB
-
MD5
c4d98bf2f30a62f37731c9532e8d0374
-
SHA1
9d5c7ee870025f62a8490a8c53e17d72133f5538
-
SHA256
a069031bda71c1515975c9b24f1a137ccc091529b870437034bf87a3e26b4d65
-
SHA512
93964435911452ca75269ddd57d9bd17f50a4af58a8c1079048c626f13867bb0285a7e223849ffe1efc930a129734533fc70e82ab498c7e42e4d20ef8baf1e4c
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEqGVs9TQhp6Ig7:FytbV3kSoXaLnToslZ9Tmp+7
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1960 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3040 c4d98bf2f30a62f37731c9532e8d0374.exe 3040 c4d98bf2f30a62f37731c9532e8d0374.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 c4d98bf2f30a62f37731c9532e8d0374.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 436 3040 c4d98bf2f30a62f37731c9532e8d0374.exe 88 PID 3040 wrote to memory of 436 3040 c4d98bf2f30a62f37731c9532e8d0374.exe 88 PID 436 wrote to memory of 1960 436 cmd.exe 91 PID 436 wrote to memory of 1960 436 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d98bf2f30a62f37731c9532e8d0374.exe"C:\Users\Admin\AppData\Local\Temp\c4d98bf2f30a62f37731c9532e8d0374.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c4d98bf2f30a62f37731c9532e8d0374.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1960
-
-