Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 22:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c57ea2ea649c7a5b20e60926e1501d9c.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c57ea2ea649c7a5b20e60926e1501d9c.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
c57ea2ea649c7a5b20e60926e1501d9c.exe
-
Size
488KB
-
MD5
c57ea2ea649c7a5b20e60926e1501d9c
-
SHA1
3671a9923b1ddd5537b708971aca09c74e6f2942
-
SHA256
100fd90de082155e6e0cc2094735c22cb7575938a0fe15f52a60f5f3e7210fe0
-
SHA512
b0a55e7d08f6b4d4f1451d6836a103f82697a14a5679601b0d9c61973dc942f5371a03a6194ff05d1476875a749e2c4b29d85cea830c75497ef8584922e06053
-
SSDEEP
12288:FytbV3kSoXaLnToslPRWy7w+V7WdU+vuHK:Eb5kSYaLTVlPzhVWdaHK
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1548 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 776 c57ea2ea649c7a5b20e60926e1501d9c.exe 776 c57ea2ea649c7a5b20e60926e1501d9c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 c57ea2ea649c7a5b20e60926e1501d9c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 776 wrote to memory of 3056 776 c57ea2ea649c7a5b20e60926e1501d9c.exe 87 PID 776 wrote to memory of 3056 776 c57ea2ea649c7a5b20e60926e1501d9c.exe 87 PID 3056 wrote to memory of 1548 3056 cmd.exe 89 PID 3056 wrote to memory of 1548 3056 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c57ea2ea649c7a5b20e60926e1501d9c.exe"C:\Users\Admin\AppData\Local\Temp\c57ea2ea649c7a5b20e60926e1501d9c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\c57ea2ea649c7a5b20e60926e1501d9c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1548
-
-