Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 15:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d679562a33d95a2eb1eb2e0cb369450a.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
d679562a33d95a2eb1eb2e0cb369450a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
d679562a33d95a2eb1eb2e0cb369450a.exe
-
Size
488KB
-
MD5
d679562a33d95a2eb1eb2e0cb369450a
-
SHA1
6094854d07b4f0104658cd92598e90e6331c7aa6
-
SHA256
ce3fb307b54fef1cccbe6c699a7e09f1cf7f4c5f62b05613e9126674b3c1dcbb
-
SHA512
14b33c4d710bfe9a04e8fc5dbab6a2fb3251d90577b33b6e6dd33598687aeda9dd783fae5494849003459dc9aa5bfd527f4a957aa209a0555626c15fba1bebcf
-
SSDEEP
12288:FytbV3kSoXaLnTosl8tKoKNY4Kaiq9A/W:Eb5kSYaLTVlmKhSxGA/W
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4084 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2444 d679562a33d95a2eb1eb2e0cb369450a.exe 2444 d679562a33d95a2eb1eb2e0cb369450a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2444 d679562a33d95a2eb1eb2e0cb369450a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1740 2444 d679562a33d95a2eb1eb2e0cb369450a.exe 84 PID 2444 wrote to memory of 1740 2444 d679562a33d95a2eb1eb2e0cb369450a.exe 84 PID 1740 wrote to memory of 4084 1740 cmd.exe 86 PID 1740 wrote to memory of 4084 1740 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d679562a33d95a2eb1eb2e0cb369450a.exe"C:\Users\Admin\AppData\Local\Temp\d679562a33d95a2eb1eb2e0cb369450a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\d679562a33d95a2eb1eb2e0cb369450a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:4084
-
-