Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4ff61ac4c97894d794b249518111086c.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
4ff61ac4c97894d794b249518111086c.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
4ff61ac4c97894d794b249518111086c.exe
-
Size
488KB
-
MD5
4ff61ac4c97894d794b249518111086c
-
SHA1
dd59a1f27cf055a6533406543f22a46a420d3433
-
SHA256
a494fa8ac9ca269322e20d08001ef40aa2c8a45b02af8eda258068e07544195a
-
SHA512
a207635e23fa391a08b24f2d00688ad9452df2008d9f9ce0b9afbfcbf784ea611b1a827312267d1c98d00f10807d898be8389b5179cdb684cb5532ad17656216
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiECP3AMLWKjb06nh1BDztdpYLm4qtkaWnCu:FytbV3kSoXaLnToslf3ADuBdClVr01Wf
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 4ff61ac4c97894d794b249518111086c.exe 2808 4ff61ac4c97894d794b249518111086c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 4ff61ac4c97894d794b249518111086c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3008 2808 4ff61ac4c97894d794b249518111086c.exe 16 PID 2808 wrote to memory of 3008 2808 4ff61ac4c97894d794b249518111086c.exe 16 PID 2808 wrote to memory of 3008 2808 4ff61ac4c97894d794b249518111086c.exe 16 PID 3008 wrote to memory of 2656 3008 cmd.exe 15 PID 3008 wrote to memory of 2656 3008 cmd.exe 15 PID 3008 wrote to memory of 2656 3008 cmd.exe 15
Processes
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2656
-
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\4ff61ac4c97894d794b249518111086c.exe"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3008
-
C:\Users\Admin\AppData\Local\Temp\4ff61ac4c97894d794b249518111086c.exe"C:\Users\Admin\AppData\Local\Temp\4ff61ac4c97894d794b249518111086c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808