Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 15:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
e200001622873a251d9abf162091c69d.exe
Resource
win7-20240319-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
e200001622873a251d9abf162091c69d.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e200001622873a251d9abf162091c69d.exe
-
Size
488KB
-
MD5
e200001622873a251d9abf162091c69d
-
SHA1
fc2ce027fe9c0874d6f84845c7797712cf5bff4a
-
SHA256
b603453f5b3533a39493d13fb222a1cf192064021b85d75dc66357df9edf8425
-
SHA512
88251c8cb924a69cf972d35fcd2798ed4f4a9824c0dcf3aa804c714f2a3a4afb0bd095be451279749d00ca500dafac240e6601854de244ae631bccf29ea5215a
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEOtG6+4PoMRxxRuyXYu5VOC5Lw:FytbV3kSoXaLnToslbgN4PoiYu5UC5Lw
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1416 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2528 e200001622873a251d9abf162091c69d.exe 2528 e200001622873a251d9abf162091c69d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2528 e200001622873a251d9abf162091c69d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4036 2528 e200001622873a251d9abf162091c69d.exe 94 PID 2528 wrote to memory of 4036 2528 e200001622873a251d9abf162091c69d.exe 94 PID 4036 wrote to memory of 1416 4036 cmd.exe 96 PID 4036 wrote to memory of 1416 4036 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e200001622873a251d9abf162091c69d.exe"C:\Users\Admin\AppData\Local\Temp\e200001622873a251d9abf162091c69d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\e200001622873a251d9abf162091c69d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1416
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3892 --field-trial-handle=2228,i,521073434451423547,2311651514500527526,262144 --variations-seed-version /prefetch:81⤵PID:2424