Analysis
-
max time kernel
144s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 02:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c776d429435329a40deea23f28d390f3.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c776d429435329a40deea23f28d390f3.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c776d429435329a40deea23f28d390f3.exe
-
Size
644KB
-
MD5
c776d429435329a40deea23f28d390f3
-
SHA1
c18f150e5ff3ffe0b0e476a4492b9f80df21eba5
-
SHA256
012ee2b288f02834fd452e7e0a62bbd2e48f5f57728770ceca6d58b53160dd6a
-
SHA512
634388f4f458621fbf00f722f4bda41f135d7790d04d20cd0c4edbf0756b5a7b66219b63187e59879f8aa9fad57b15a740f54b477ffb135a6fedff77b9bcb8a4
-
SSDEEP
12288:FytbV3kSoXaLnTosly5M5wis5YKe3VhzO1ZMyZNL7i0rLv:Eb5kSYaLTVls5YKeFhypaG
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 544 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2388 c776d429435329a40deea23f28d390f3.exe 2388 c776d429435329a40deea23f28d390f3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 c776d429435329a40deea23f28d390f3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3904 2388 c776d429435329a40deea23f28d390f3.exe 87 PID 2388 wrote to memory of 3904 2388 c776d429435329a40deea23f28d390f3.exe 87 PID 3904 wrote to memory of 544 3904 cmd.exe 89 PID 3904 wrote to memory of 544 3904 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c776d429435329a40deea23f28d390f3.exe"C:\Users\Admin\AppData\Local\Temp\c776d429435329a40deea23f28d390f3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c776d429435329a40deea23f28d390f3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:544
-
-