Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 08:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad4570f9bfd07c5d8a09477765927fa0N.exe
Resource
win7-20240705-en
6 signatures
120 seconds
Behavioral task
behavioral2
Sample
ad4570f9bfd07c5d8a09477765927fa0N.exe
Resource
win10v2004-20240709-en
5 signatures
120 seconds
General
-
Target
ad4570f9bfd07c5d8a09477765927fa0N.exe
-
Size
448KB
-
MD5
ad4570f9bfd07c5d8a09477765927fa0
-
SHA1
44ffe942bef0e3d4fef5875db54ead9e3f5efdc0
-
SHA256
6c841fab43813baec463b6e51b4a8ea914b93965c6e89d998f21ac6b04371c92
-
SHA512
b17be93fdd734f1aae9e65773139c5a95c1232af05d08e9c4044e01abe7d3e6684f5899287fc3a5f2149ca1b05d608109cffa0b70986cd297ba527acace2fc7a
-
SSDEEP
12288:fytbV3kSoXaLnxoslycUOIiYB7/9DHkAoRjnCHYi:+b5kSYaLxVlyUbYBJFmjnCHB
Score
3/10
Malware Config
Signatures
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5000 cmd.exe 4532 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4532 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3416 ad4570f9bfd07c5d8a09477765927fa0N.exe 3416 ad4570f9bfd07c5d8a09477765927fa0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3416 ad4570f9bfd07c5d8a09477765927fa0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3416 wrote to memory of 5000 3416 ad4570f9bfd07c5d8a09477765927fa0N.exe 84 PID 3416 wrote to memory of 5000 3416 ad4570f9bfd07c5d8a09477765927fa0N.exe 84 PID 5000 wrote to memory of 4532 5000 cmd.exe 86 PID 5000 wrote to memory of 4532 5000 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad4570f9bfd07c5d8a09477765927fa0N.exe"C:\Users\Admin\AppData\Local\Temp\ad4570f9bfd07c5d8a09477765927fa0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\ad4570f9bfd07c5d8a09477765927fa0N.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4532
-
-