Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
045e36319950f651cec4daf9b06459ff.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
045e36319950f651cec4daf9b06459ff.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
045e36319950f651cec4daf9b06459ff.exe
-
Size
488KB
-
MD5
045e36319950f651cec4daf9b06459ff
-
SHA1
773ef693222d8f3136523aa7f6ae2e8e6faa0786
-
SHA256
61d9400699f00b9668fe5c89a9de0df9044720b1242ada0bc8c49cf1ac844abb
-
SHA512
df7a2799b03a48f2a348b857c06e6f49c44172604744d11a58ee8d16fe9ef0a9d76f15421c47c08dc19d0f44c00c594108a4234ce51b54a1ee6821bb1ae5e7da
-
SSDEEP
12288:FytbV3kSoXaLnTosl/JNelsSEPGjrYSBNSA:Eb5kSYaLTVl/JNMEDeND
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1904 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2796 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1888 045e36319950f651cec4daf9b06459ff.exe 1888 045e36319950f651cec4daf9b06459ff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1888 045e36319950f651cec4daf9b06459ff.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1904 1888 045e36319950f651cec4daf9b06459ff.exe 29 PID 1888 wrote to memory of 1904 1888 045e36319950f651cec4daf9b06459ff.exe 29 PID 1888 wrote to memory of 1904 1888 045e36319950f651cec4daf9b06459ff.exe 29 PID 1904 wrote to memory of 2796 1904 cmd.exe 30 PID 1904 wrote to memory of 2796 1904 cmd.exe 30 PID 1904 wrote to memory of 2796 1904 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\045e36319950f651cec4daf9b06459ff.exe"C:\Users\Admin\AppData\Local\Temp\045e36319950f651cec4daf9b06459ff.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\045e36319950f651cec4daf9b06459ff.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2796
-
-