Analysis
-
max time kernel
7s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1d674e24157270a91d12f57f4e9c9542.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d674e24157270a91d12f57f4e9c9542.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1d674e24157270a91d12f57f4e9c9542.exe
-
Size
488KB
-
MD5
1d674e24157270a91d12f57f4e9c9542
-
SHA1
4d87c7a9d70abd67c86c7acc5b0b069449350c33
-
SHA256
ebe79db9219d9005c6ad6c537146208d401249c720a39efd2927c8689c09132b
-
SHA512
e1cdfe785ab25710ce91d1ec50c7e2af54ce54d2e2b3ea1d0904bced42c72810913f012c06b642b0e78f29c9c15cc266a77a883ee18bf18de7bcc6c00306835d
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiE9eaOCdXZwOEY3HEaqzwA5rrFXktY0b+Bj:FytbV3kSoXaLnTosl9KZd3HEaSw2r5q2
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2792 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2456 1d674e24157270a91d12f57f4e9c9542.exe 2456 1d674e24157270a91d12f57f4e9c9542.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2456 1d674e24157270a91d12f57f4e9c9542.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2376 2456 1d674e24157270a91d12f57f4e9c9542.exe 28 PID 2456 wrote to memory of 2376 2456 1d674e24157270a91d12f57f4e9c9542.exe 28 PID 2456 wrote to memory of 2376 2456 1d674e24157270a91d12f57f4e9c9542.exe 28 PID 2376 wrote to memory of 2792 2376 cmd.exe 30 PID 2376 wrote to memory of 2792 2376 cmd.exe 30 PID 2376 wrote to memory of 2792 2376 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d674e24157270a91d12f57f4e9c9542.exe"C:\Users\Admin\AppData\Local\Temp\1d674e24157270a91d12f57f4e9c9542.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1d674e24157270a91d12f57f4e9c9542.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2792
-
-