Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 11:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cdfa2d345acc4baeca58296698708f5a.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
cdfa2d345acc4baeca58296698708f5a.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
cdfa2d345acc4baeca58296698708f5a.exe
-
Size
488KB
-
MD5
cdfa2d345acc4baeca58296698708f5a
-
SHA1
3f2dff2299f9b62c55434cc3f34192280b4d323b
-
SHA256
e2b20fcbcef20fd1bc0bcb0c6f03b860e92648890a6d2ef650dd45b73c690003
-
SHA512
c639b2d1a0fd8a0b077c5b15b50d3575d52963b077e22e9cb751b6e76a0191825d914eb1ef862acfe1d03a02c497c6b93f9ee2d71f45954cc94f4cf6d6a7c4c9
-
SSDEEP
12288:FytbV3kSoXaLnTosl/FlWLaASZ/TbEToKH:Eb5kSYaLTVlbmTShYToKH
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 228 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3312 cdfa2d345acc4baeca58296698708f5a.exe 3312 cdfa2d345acc4baeca58296698708f5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3312 cdfa2d345acc4baeca58296698708f5a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3312 wrote to memory of 1496 3312 cdfa2d345acc4baeca58296698708f5a.exe 95 PID 3312 wrote to memory of 1496 3312 cdfa2d345acc4baeca58296698708f5a.exe 95 PID 1496 wrote to memory of 228 1496 cmd.exe 97 PID 1496 wrote to memory of 228 1496 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdfa2d345acc4baeca58296698708f5a.exe"C:\Users\Admin\AppData\Local\Temp\cdfa2d345acc4baeca58296698708f5a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\cdfa2d345acc4baeca58296698708f5a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:228
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4256 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4692