Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
13eef28fa6a133ec8a7ec31b12643548.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
13eef28fa6a133ec8a7ec31b12643548.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
13eef28fa6a133ec8a7ec31b12643548.exe
-
Size
316KB
-
MD5
13eef28fa6a133ec8a7ec31b12643548
-
SHA1
72456fb04ee52e067689a895743ae3a7c399d468
-
SHA256
8b383ca733d322fb80cd870c3c772bc8f3ff44bbff78ec745eb203e3201f7ea4
-
SHA512
0ba55ab1752a5f99a420a188e6dc7788f4e7e0264ae354e49e44288c99c0c6bdc43aaef6e4839b18a48984b43eb05b442d07919328530f10927102c6f0961b4f
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiE4M4xxHev:FytbV3kSoXaLnToslHVNev
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1876 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3044 13eef28fa6a133ec8a7ec31b12643548.exe 3044 13eef28fa6a133ec8a7ec31b12643548.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 13eef28fa6a133ec8a7ec31b12643548.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2540 3044 13eef28fa6a133ec8a7ec31b12643548.exe 16 PID 3044 wrote to memory of 2540 3044 13eef28fa6a133ec8a7ec31b12643548.exe 16 PID 3044 wrote to memory of 2540 3044 13eef28fa6a133ec8a7ec31b12643548.exe 16 PID 2540 wrote to memory of 1876 2540 cmd.exe 14 PID 2540 wrote to memory of 1876 2540 cmd.exe 14 PID 2540 wrote to memory of 1876 2540 cmd.exe 14
Processes
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:1876
-
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\13eef28fa6a133ec8a7ec31b12643548.exe"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2540
-
C:\Users\Admin\AppData\Local\Temp\13eef28fa6a133ec8a7ec31b12643548.exe"C:\Users\Admin\AppData\Local\Temp\13eef28fa6a133ec8a7ec31b12643548.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044