Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1d71c119402d10295657517a4fb41c22.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d71c119402d10295657517a4fb41c22.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
1d71c119402d10295657517a4fb41c22.exe
-
Size
644KB
-
MD5
1d71c119402d10295657517a4fb41c22
-
SHA1
b362f2f9b082c4d86b1cac594a87cb957c8633fb
-
SHA256
d8e7de8e9d9d7eb4ad2c0981f3b71c8f57ec17c3527d2ded393901e99110c4c8
-
SHA512
30c2f590a8b0fbad2011cdb5a7fb1ec9aba4c2ff2d6d3795ef3b4fea5534f253f26f350392726fa822c9d1bb2f6ad73a456a54fd8327b179fd6c883377ecbf78
-
SSDEEP
12288:FytbV3kSoXaLnToslA8CwR6PX7iwtklKZ5PvuE6sXEt8:Eb5kSYaLTVlXC66/7LtfZ5Pv5g8
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2976 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2656 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2872 1d71c119402d10295657517a4fb41c22.exe 2872 1d71c119402d10295657517a4fb41c22.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 1d71c119402d10295657517a4fb41c22.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2976 2872 1d71c119402d10295657517a4fb41c22.exe 28 PID 2872 wrote to memory of 2976 2872 1d71c119402d10295657517a4fb41c22.exe 28 PID 2872 wrote to memory of 2976 2872 1d71c119402d10295657517a4fb41c22.exe 28 PID 2976 wrote to memory of 2656 2976 cmd.exe 30 PID 2976 wrote to memory of 2656 2976 cmd.exe 30 PID 2976 wrote to memory of 2656 2976 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d71c119402d10295657517a4fb41c22.exe"C:\Users\Admin\AppData\Local\Temp\1d71c119402d10295657517a4fb41c22.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1d71c119402d10295657517a4fb41c22.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2656
-
-