Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09dcc2494bdacc6f66978955c2fa4bc0.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
09dcc2494bdacc6f66978955c2fa4bc0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
09dcc2494bdacc6f66978955c2fa4bc0.exe
-
Size
528KB
-
MD5
09dcc2494bdacc6f66978955c2fa4bc0
-
SHA1
8b7bc581b6cb699675f4bef2676f62477c05443a
-
SHA256
1922457731e7717b15bf5355aea58831476ec6326be595f28da8cbccedad15b7
-
SHA512
f030ab22bb54e34a8a9aea06b30ac937d4c6502c3781a53913e388cfaa9f903c6382878b61ff34666e258b4ffabbf39c323bf83094472199852d4c2fd78bc8f2
-
SSDEEP
12288:FytbV3kSoXaLnTosleMFS4tlCrfUzmEWgX1eZw:Eb5kSYaLTVleDUl5cgX1eK
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 09dcc2494bdacc6f66978955c2fa4bc0.exe 2740 09dcc2494bdacc6f66978955c2fa4bc0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 09dcc2494bdacc6f66978955c2fa4bc0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2944 2740 09dcc2494bdacc6f66978955c2fa4bc0.exe 23 PID 2740 wrote to memory of 2944 2740 09dcc2494bdacc6f66978955c2fa4bc0.exe 23 PID 2740 wrote to memory of 2944 2740 09dcc2494bdacc6f66978955c2fa4bc0.exe 23 PID 2944 wrote to memory of 2716 2944 cmd.exe 24 PID 2944 wrote to memory of 2716 2944 cmd.exe 24 PID 2944 wrote to memory of 2716 2944 cmd.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\09dcc2494bdacc6f66978955c2fa4bc0.exe"C:\Users\Admin\AppData\Local\Temp\09dcc2494bdacc6f66978955c2fa4bc0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\09dcc2494bdacc6f66978955c2fa4bc0.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2716
-
-