Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
111f516bd6c118135267bfb31febd97c.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
111f516bd6c118135267bfb31febd97c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
111f516bd6c118135267bfb31febd97c.exe
-
Size
488KB
-
MD5
111f516bd6c118135267bfb31febd97c
-
SHA1
6e5430ee462bf9b8bb772a9ec84a64049476d3ef
-
SHA256
7d8aec8262680584106a6a7c1719206c1b7be09e8ba09d4fe5d4c686583e4bec
-
SHA512
5ddc2e9dfb1776a70141c52a5d631cb0f6145b9c098d2d3c46e4fef6290860ee8ef3072c2f1ab1dff7cc7ffb582f40367b4596f382fe37d23d4da01dc533f904
-
SSDEEP
12288:FytbV3kSoXaLnTosla1l+1FelwgC3aJW/w1X:Eb5kSYaLTVlxACiJGAX
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1264 111f516bd6c118135267bfb31febd97c.exe 1264 111f516bd6c118135267bfb31febd97c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 111f516bd6c118135267bfb31febd97c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3000 1264 111f516bd6c118135267bfb31febd97c.exe 28 PID 1264 wrote to memory of 3000 1264 111f516bd6c118135267bfb31febd97c.exe 28 PID 1264 wrote to memory of 3000 1264 111f516bd6c118135267bfb31febd97c.exe 28 PID 3000 wrote to memory of 1988 3000 cmd.exe 30 PID 3000 wrote to memory of 1988 3000 cmd.exe 30 PID 3000 wrote to memory of 1988 3000 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\111f516bd6c118135267bfb31febd97c.exe"C:\Users\Admin\AppData\Local\Temp\111f516bd6c118135267bfb31febd97c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\111f516bd6c118135267bfb31febd97c.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:1988
-
-