Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
15fabf549f5654150d7b9ec7b7bb517e.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
15fabf549f5654150d7b9ec7b7bb517e.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
15fabf549f5654150d7b9ec7b7bb517e.exe
-
Size
316KB
-
MD5
15fabf549f5654150d7b9ec7b7bb517e
-
SHA1
898e7b9a58b457d2113b02606cd314a115f1b9e6
-
SHA256
92ed012f2b5b16689433b763ccffbcdfdacce02796e61b71b9f847cb1f4848af
-
SHA512
86437600a40b9a9d0ac2d368f8fe05b96b4eccc9fd344b3835ccf2aab466a4887e1c9a120b5acfabd7d0f68ebcc4ba1be1ca00e662533cdd7fbec274ab660f2c
-
SSDEEP
6144:FUORK1ttbV3kSobTYZGiNdniCoh+KiEWgR3MXEL:FytbV3kSoXaLnToslLe
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1256 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2892 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1240 15fabf549f5654150d7b9ec7b7bb517e.exe 1240 15fabf549f5654150d7b9ec7b7bb517e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1240 15fabf549f5654150d7b9ec7b7bb517e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1256 1240 15fabf549f5654150d7b9ec7b7bb517e.exe 28 PID 1240 wrote to memory of 1256 1240 15fabf549f5654150d7b9ec7b7bb517e.exe 28 PID 1240 wrote to memory of 1256 1240 15fabf549f5654150d7b9ec7b7bb517e.exe 28 PID 1256 wrote to memory of 2892 1256 cmd.exe 30 PID 1256 wrote to memory of 2892 1256 cmd.exe 30 PID 1256 wrote to memory of 2892 1256 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\15fabf549f5654150d7b9ec7b7bb517e.exe"C:\Users\Admin\AppData\Local\Temp\15fabf549f5654150d7b9ec7b7bb517e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\15fabf549f5654150d7b9ec7b7bb517e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60003⤵
- Runs ping.exe
PID:2892
-
-