Analysis
-
max time kernel
85s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 13:54
Behavioral task
behavioral1
Sample
pluto/files/AnDDoS.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
7 signatures
600 seconds
General
-
Target
pluto/files/AnDDoS.exe
-
Size
522KB
-
MD5
d027869ca68b6df09e2fe721a1acb994
-
SHA1
d50ea5e2ab1b5b9362f010248328b19a5a395dfe
-
SHA256
0cad6aa35e8bc5c0148fd17b3ebb3477175520cd6bf32fcde9ab19ca03425a29
-
SHA512
8890d7ac227a7a8368a71a84797916521886d58de69c78ecccea82ec357f33930b28ac215905ee926b2d9f93808ff72d37cd600511eab1c4e16b9140891601a5
-
SSDEEP
12288:cCga6BJor4hQMdhwS9XVCga6BJor4hQMdhwS9Xm:cCga6BJe4q6JlCga6BJe4q6J2
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnDDoS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2528 cmd.exe 228 PING.EXE 3560 cmd.exe 2800 PING.EXE 5104 cmd.exe 4232 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 228 PING.EXE 2800 PING.EXE 4232 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4464 AnDDoS.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4464 AnDDoS.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 AnDDoS.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4464 wrote to memory of 2528 4464 AnDDoS.exe 98 PID 4464 wrote to memory of 2528 4464 AnDDoS.exe 98 PID 4464 wrote to memory of 2528 4464 AnDDoS.exe 98 PID 2528 wrote to memory of 228 2528 cmd.exe 100 PID 2528 wrote to memory of 228 2528 cmd.exe 100 PID 2528 wrote to memory of 228 2528 cmd.exe 100 PID 4464 wrote to memory of 3560 4464 AnDDoS.exe 101 PID 4464 wrote to memory of 3560 4464 AnDDoS.exe 101 PID 4464 wrote to memory of 3560 4464 AnDDoS.exe 101 PID 3560 wrote to memory of 2800 3560 cmd.exe 103 PID 3560 wrote to memory of 2800 3560 cmd.exe 103 PID 3560 wrote to memory of 2800 3560 cmd.exe 103 PID 4464 wrote to memory of 5104 4464 AnDDoS.exe 104 PID 4464 wrote to memory of 5104 4464 AnDDoS.exe 104 PID 4464 wrote to memory of 5104 4464 AnDDoS.exe 104 PID 5104 wrote to memory of 4232 5104 cmd.exe 106 PID 5104 wrote to memory of 4232 5104 cmd.exe 106 PID 5104 wrote to memory of 4232 5104 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\pluto\files\AnDDoS.exe"C:\Users\Admin\AppData\Local\Temp\pluto\files\AnDDoS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.execmd.exe /k ping google.com -t2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\PING.EXEping google.com -t3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /k ping google.com -t2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\PING.EXEping google.com -t3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /k ping google.com -t2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\PING.EXEping google.com -t3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4232
-
-