Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 12:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
258b3eaf8356f81d5b3679845a42850a.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
258b3eaf8356f81d5b3679845a42850a.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
258b3eaf8356f81d5b3679845a42850a.exe
-
Size
316KB
-
MD5
258b3eaf8356f81d5b3679845a42850a
-
SHA1
e0971f9698d4212b60f6bd302e98e8868c2d9797
-
SHA256
d98c93936a7eb9008dd6ec1b7addc12cd28bba806a5386bf5c3f35f6b6275607
-
SHA512
2962fd4b9034200243a1ea9d5414afbd92ba991bb52b647f14b9c6cfc752a8b7c362fb2872c5ca18d880bf85b3f233a2d94fdcd58444317cb33339cb0f209abe
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEmJNQp3KzuJtJ:FytbV3kSoXaLnToslLNQp3
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2308 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1636 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1652 258b3eaf8356f81d5b3679845a42850a.exe 1652 258b3eaf8356f81d5b3679845a42850a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1652 258b3eaf8356f81d5b3679845a42850a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2308 1652 258b3eaf8356f81d5b3679845a42850a.exe 29 PID 1652 wrote to memory of 2308 1652 258b3eaf8356f81d5b3679845a42850a.exe 29 PID 1652 wrote to memory of 2308 1652 258b3eaf8356f81d5b3679845a42850a.exe 29 PID 2308 wrote to memory of 1636 2308 cmd.exe 30 PID 2308 wrote to memory of 1636 2308 cmd.exe 30 PID 2308 wrote to memory of 1636 2308 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\258b3eaf8356f81d5b3679845a42850a.exe"C:\Users\Admin\AppData\Local\Temp\258b3eaf8356f81d5b3679845a42850a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\258b3eaf8356f81d5b3679845a42850a.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1636
-
-