Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
178d24583c09f2c6190624f5cca2081d.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
178d24583c09f2c6190624f5cca2081d.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
178d24583c09f2c6190624f5cca2081d.exe
-
Size
488KB
-
MD5
178d24583c09f2c6190624f5cca2081d
-
SHA1
72f93b3a2479d4cabb0765d5fdd31847c01abc35
-
SHA256
7fadae05c475a240c20bed551b19a869bc850072ea6ea2c3fcb721f7b9088845
-
SHA512
818eb779ba9425b83c105936856c686f5479b0e5ac3f1fb9ba8fb15a8cb8c735c2b6009aa153745e4a21e03d810e85927a234ee0603f4a5b7ac378de50e3cf2b
-
SSDEEP
12288:FytbV3kSoXaLnToslPjEjwECBT/o0ACweW0bC0:Eb5kSYaLTVlPL/rnC0
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2012 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2688 178d24583c09f2c6190624f5cca2081d.exe 2688 178d24583c09f2c6190624f5cca2081d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 178d24583c09f2c6190624f5cca2081d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3048 2688 178d24583c09f2c6190624f5cca2081d.exe 30 PID 2688 wrote to memory of 3048 2688 178d24583c09f2c6190624f5cca2081d.exe 30 PID 2688 wrote to memory of 3048 2688 178d24583c09f2c6190624f5cca2081d.exe 30 PID 3048 wrote to memory of 2012 3048 cmd.exe 28 PID 3048 wrote to memory of 2012 3048 cmd.exe 28 PID 3048 wrote to memory of 2012 3048 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\178d24583c09f2c6190624f5cca2081d.exe"C:\Users\Admin\AppData\Local\Temp\178d24583c09f2c6190624f5cca2081d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 6000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\178d24583c09f2c6190624f5cca2081d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3048
-
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 60001⤵
- Runs ping.exe
PID:2012