Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 07:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e111fb32447c79ace8662804ad231abe.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e111fb32447c79ace8662804ad231abe.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
e111fb32447c79ace8662804ad231abe.exe
-
Size
488KB
-
MD5
e111fb32447c79ace8662804ad231abe
-
SHA1
4a4781d501268db63366703d47485d12b0ba6007
-
SHA256
c5d9c85037f587e77b116abeda35041557a3c2faff42d9443bb88d89ba8b69ff
-
SHA512
fd7ed6bb4214f549150815ffbc0a23bd312d4da00a4b8b183c508efccc9a3238fb67e4ed4c025bd306a9296846e51725686ef802448afcc26b1975ca878793cf
-
SSDEEP
12288:FytbV3kSoXaLnTosln35vSEfhTLBRqihhP:Eb5kSYaLTVlnpvSEJTL5fP
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 228 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 e111fb32447c79ace8662804ad231abe.exe 2864 e111fb32447c79ace8662804ad231abe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 e111fb32447c79ace8662804ad231abe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4700 2864 e111fb32447c79ace8662804ad231abe.exe 88 PID 2864 wrote to memory of 4700 2864 e111fb32447c79ace8662804ad231abe.exe 88 PID 4700 wrote to memory of 228 4700 cmd.exe 90 PID 4700 wrote to memory of 228 4700 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e111fb32447c79ace8662804ad231abe.exe"C:\Users\Admin\AppData\Local\Temp\e111fb32447c79ace8662804ad231abe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\e111fb32447c79ace8662804ad231abe.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:228
-
-