Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d5634673bf70e09fc305956846cbc93.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d5634673bf70e09fc305956846cbc93.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0d5634673bf70e09fc305956846cbc93.exe
-
Size
1.6MB
-
MD5
0d5634673bf70e09fc305956846cbc93
-
SHA1
5cbfd2cab57f8182a450521fd8988ccca2cdb528
-
SHA256
933963f5496afe1effe9c356aa28a95ebf2ac26c5211f1fbb28b879cafe95a85
-
SHA512
f422ee1ed7c92a740acf410737c4fe7eb09ad464a50df4519d2144bfa17a589fef143e27e9d5c516064644918f6de3cf0707f3f415eaa2fd303eae3ffaad9463
-
SSDEEP
49152:Eb5k2L5HgqZnHKT0YWqLPSTXG9AuDr+Ukw13:E6qh3qLKjUAu/+x2
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 400 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3012 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 0d5634673bf70e09fc305956846cbc93.exe 2948 0d5634673bf70e09fc305956846cbc93.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2948 0d5634673bf70e09fc305956846cbc93.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2948 wrote to memory of 400 2948 0d5634673bf70e09fc305956846cbc93.exe 28 PID 2948 wrote to memory of 400 2948 0d5634673bf70e09fc305956846cbc93.exe 28 PID 2948 wrote to memory of 400 2948 0d5634673bf70e09fc305956846cbc93.exe 28 PID 400 wrote to memory of 3012 400 cmd.exe 30 PID 400 wrote to memory of 3012 400 cmd.exe 30 PID 400 wrote to memory of 3012 400 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d5634673bf70e09fc305956846cbc93.exe"C:\Users\Admin\AppData\Local\Temp\0d5634673bf70e09fc305956846cbc93.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\0d5634673bf70e09fc305956846cbc93.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:3012
-
-