Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 11:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cb5a65b7e2ea2697235dcdd42dc268cf.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cb5a65b7e2ea2697235dcdd42dc268cf.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
cb5a65b7e2ea2697235dcdd42dc268cf.exe
-
Size
5.1MB
-
MD5
cb5a65b7e2ea2697235dcdd42dc268cf
-
SHA1
4926a936aed6dce02a8053fdaf518f3bf569561e
-
SHA256
ad327429538b263f40694e109fda99ac366c0c9c4a479d09fda618ffc830b94d
-
SHA512
5cc5a6d1e04ff80a595f74624104f45933d063fdf1b8c102f44684bafaa98241d9ed7155e6dcf02e3f76962d467998ac260cba636e6a30115ee395a1d576a6bf
-
SSDEEP
98304:E+hSKt0pvScTpu5IlfrU5CgRhepVAUJaFSYartAeGhfM7SU:Em50pvxIco+ptQ0JyhYSU
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4536 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 cb5a65b7e2ea2697235dcdd42dc268cf.exe 2660 cb5a65b7e2ea2697235dcdd42dc268cf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 cb5a65b7e2ea2697235dcdd42dc268cf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4252 2660 cb5a65b7e2ea2697235dcdd42dc268cf.exe 87 PID 2660 wrote to memory of 4252 2660 cb5a65b7e2ea2697235dcdd42dc268cf.exe 87 PID 4252 wrote to memory of 4536 4252 cmd.exe 90 PID 4252 wrote to memory of 4536 4252 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb5a65b7e2ea2697235dcdd42dc268cf.exe"C:\Users\Admin\AppData\Local\Temp\cb5a65b7e2ea2697235dcdd42dc268cf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\cb5a65b7e2ea2697235dcdd42dc268cf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4536
-
-