Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 01:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d4da61c276a4685cb951dcde4eb035a1.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
d4da61c276a4685cb951dcde4eb035a1.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
d4da61c276a4685cb951dcde4eb035a1.exe
-
Size
316KB
-
MD5
d4da61c276a4685cb951dcde4eb035a1
-
SHA1
2c6da47d1547bcdb1b20b27147a773869ae4f1e0
-
SHA256
2cfe15f91875488aa9a0f8ea8ba867c405cf7e65f862c8875cdfe494c2d9a14c
-
SHA512
aaaad1f287bf6855136d657bb963b269fef610534b0e096a1e26b4241882f8a60702c83f8096cc04bb8464662f91580a56f0ad01af20de67979af0479975b916
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEzkonUmo2:FytbV3kSoXaLnTosl4ka5f
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3840 d4da61c276a4685cb951dcde4eb035a1.exe 3840 d4da61c276a4685cb951dcde4eb035a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3840 d4da61c276a4685cb951dcde4eb035a1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3492 3840 d4da61c276a4685cb951dcde4eb035a1.exe 96 PID 3840 wrote to memory of 3492 3840 d4da61c276a4685cb951dcde4eb035a1.exe 96 PID 3492 wrote to memory of 1904 3492 cmd.exe 98 PID 3492 wrote to memory of 1904 3492 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4da61c276a4685cb951dcde4eb035a1.exe"C:\Users\Admin\AppData\Local\Temp\d4da61c276a4685cb951dcde4eb035a1.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\d4da61c276a4685cb951dcde4eb035a1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1904
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3648 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:81⤵PID:2156